官术网_书友最值得收藏!

Information security program maturity

As you work through the various frameworks, it is important to remember that they are not checklists. These frameworks need to be used to develop your own security program. A key aspect in developing a strong information security program is to understand that you should not be boiling the ocean. By this, I mean that you should not be trying to do so much that you end up doing nothing or worse, causing serious harm to the organization.

As you develop your plan to implement your information security program, you must consider where you are presently from an information security program maturity perspective. As you engage in planning, you need to think about how you can push your program along the maturity life cycle. As an example, you cannot push your organization into a place where you are implementing continuous and effective monitoring of security controls if you are implementing those controls in an ad hoc fashion. You must first focus on developing plans where information security control development is part of the organizational culture and system development life cycle. 

  • Initial:
    • No formal security program in place
    • Unstaffed or understaffed
    • Security controls are implemented in an ad hoc manner or not at all
  • Developing:
    • Basic governance and risk management policies, standards, procedures, and guidelines are in place
    • Information security leadership is in place
    • Informal communications
    • Security controls begin to be developed and implemented
  • Defined:
    • Information security roles such as system owner and data owner are defined
    • Organization-wide polices are in place with inadequate verification
    • More security controls are in place but lack automation
  • Managed:
    • Clearly defined roles and responsibilities accompanied by role-based training
    • Formal information security communication with business stakeholders
    • Controls measured and monitored for compliance
    • Automation is still not fully used throughout the environment
  • Optimized:
    • Culture of organization supports information security improvements for people, processes, and technology
    • Organization implements a risk-based management program for information security
    • Controls are comprehensively implemented across the environment
    • Automation is implemented to support repeatable processes and continuous monitoring
主站蜘蛛池模板: 昌平区| 新宁县| 延庆县| 湛江市| 四会市| 湘乡市| 古丈县| 乐清市| 镇原县| 平顶山市| 武鸣县| 衡南县| 鹿泉市| 万载县| 麟游县| 阿拉善盟| 繁峙县| 乌兰浩特市| 平顶山市| 绩溪县| 伽师县| 屏边| 莱西市| 正安县| 循化| 新昌县| 弥勒县| 伊宁市| 大石桥市| 宜兰市| 海宁市| 西贡区| 龙里县| 特克斯县| 前郭尔| 自治县| 双城市| 湘乡市| 黄梅县| 大关县| 娱乐|