Organization of information security

Assignment Help Other Subject
Reference no: EM133173415

Governance - Risk - Compliance

Instructions

Complete the document only for the tabs:

1. Under the Statement of Applicability tab (Rows 3-16)

Security Policy

A5.1 Information security policy

A.5.1.1 Policies for information security A set of policies for information security shall be defined, approved by management, published and communicated to employees and relevant external parties.
A.5.1.2 Review of the policies for information security The policies for information security shall be reviewed at planned intervals or if significant changes occur to ensure their continuing suitability, adequacy and effectiveness
A.6 Organization of information security
A.6.1 Internal Organization To manage information security within the organization.
A.6.1.1 Information security roles and responsibilities All information security responsibilities shall be defined and allocated.
A.6.1.2 Segregation of duties Conflicting duties and areas of responsibility shall be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization's assets.
A.6.1.3 Contact with authorities Appropriate contacts with relevant authorities shall be maintained.
A.6.1.4 Contact with special interest groups Appropriate contacts with special interest groups or other specialist security forums and professional associations shall be maintained.
A.6.1.5 Information security in project management Information security shall be addressed in project management, regardless of the type of the project.
A6.2 Mobile devices and teleworking
A.6.2.1 Mobile device policy A policy and supporting security measures shall be adopted to manage the risks introduced by using mobile devices.
A.6.2.2 Teleworking A policy and supporting security measures shall be implemented to protect information accessed, processed or stored at teleworking sites.

2. Info Sec Policy

Question
"[ISP 1.01] Does the Information Security Policy address the following:
- Access control
- Asset Management
- Business Continuity Management
- Communications and Operations Management
- Compliance
- Human Resource Security
- Information Security Incident Management
- Information Systems Acquisition, Development, and Maintenance
- Physical and Environmental Security"
[ISP 1.02] Do you maintain an information security policy that is , approved by top management, communicated to all vendor resources, and reviewed at least annually?
[ISP 1.03] Do data classification requirements define rules for managing, handling, and labeling of data for each data class?
[ISP 1.04] Is there a documented, approved, and communicated formal disciplinary or sanction policy?

3. Organization of Information Security

Question
[PES 1.01] Is there a documented, approved, and communicated physical security policy?
[PES 1.02] Do your facilities meet legal and regulatory requirements, and do you have a valid certificate of operations?
"[PES 1.03] Does your facility have adequate physical security perimeter controls (doors, solid walls, locked windows, CCTV, manned reception desk, etc.)?
Please provide details in ""Comments"" section."
[PES 1.04] Are access points such as delivery and loading areas and other possible entry points controlled and isolated from information processing facilities?
"[PES 1.05] Are KP-related activities performed from a dedicated area that is only accessible to staff dedicated to the KP account?
If yes, please describe controls that are in place to limit access to unauthorized individuals.
Examples:
(a) Badge readers on all entry/exit points, anti pass back activated
(b) Presence of security guards
(c) Entry/exit points equipped with CCTV cameras
(d) Windows are frosted to protect individuals from looking in to the restricted area
(e) Existence of strict visitor processes, where KP management needs to approve external visitors
(f) Emergency exits are monitored and only allow individuals to exit work area in case of emergency"
[PES 1.06] Are personnel (including subcontractors and external parties) with access to the KP work area authorized by appropriate KP personnel and issued a personally identifiable photo badge that is displayed while the individual is within the facility?
[PES 1.07] Do facility and datacenter have adequate fire detection/prevention and water detection/prevention measures in place?
[PES 1.08] Are all physical security equipment (such as access control systems and surveillance systems) hosted in a secured area?
[PES 1.09] Are physical access logs and surveillance feeds captured, reviewed, and maintained ?
[PES 1.10] Do you have process for provisioning of physical access?
[PES 1.11] Do you have process for termination of physical access (that also includes provisions for transfer)?
[PES 1.12] Are all vendor personnel who are authorized to approve access to the KP work area reviewed on a periodic basis and is the list communicated to authorized KP personnel?
[PES 1.13] Is a process for periodic review of physical access in place?
"[PES 1.14] Is segregation of duties maintained for the following functions:
- Approving and configuring physical access
- Configuring access and reviewing access logs
- Configuring and storing/issuing access cards which are not in use"
[PES 1.15] Is an inventory of access cards maintained and reviewed by the physical security team?
[PES 1.16] Is there a process for management of visitors that includes check in/check out and requirement to escort visitors during their stay at the facility?
[PES 1.17] Are all external visitors to the Offshore Development Center (ODC) approved by the authorized KP personnel in advance?
[PES 1.18] Is there a process for replacing lost / stolen access cards?
"[PES 1.19] Are measures in place to prevent staff from taking sensitive information in/out of the dedicated work area?
If yes, please describe measures
Examples:
(a) Screening of bags at point of entry
(b) No allowing staff to take paper in/out of the dedicated work area
(c) No use of cell phones into the work area"
[PES 2.01] Are physical and environmental measures (e.g. temperature, water, humidity) monitored within the critical infrastructure rooms?
[PES 2.02] Is personnel training conducted and security measures applied to usage of off-site equipment and infrastructure?
[PES 2.03] Are technical infrastructure, media, and physical security equipment hosted in secure areas?
[PES 2.04] Are processes in place (including approval) for the removal of data and / or equipment out of the critical infrastructure rooms?
[PES 2.05] Are facilities installed with adequate alternate sources of power (e.g., diesel generator set, uninterruptible power supply in order to provide 24 x 7 x 365 power backup?)
[PES 2.06] Are there maintenance contracts maintained that cover facility and security equipment?

Attachment:- Governance.rar

Attachment:- Audit_and_Assessment.rar

Reference no: EM133173415

Questions Cloud

Reflect on your own lifestyle and habits : Reflect on your own lifestyle and habits. Consider the resources provided to you and determine what changes you can apply in your life and for your environment.
Give the entry to record the issuance of the bonds : Larel Corporation issued $40,000, 9%, ten-year bonds payable at 108 that were dated April 1, 2022. Give the entry to record the issuance of the bonds
Digital forensic examiner : You are a newly appointed Digital Forensic Examiner. What training should you attend? What certifications should you pursue?
What is meant by term social construct : What is meant by the term "social construct" when associated with race? How does that impact the accuracy of crime statistics?
Organization of information security : Organization of Information Security - Complete the attached document only for the tabs - Mobile device policy A policy and supporting security measures
Compute the after tax cost of preferred stock : The treasurer of Riley Coal Co. is asked to compute the cost of fixed income securities for her corporation. Compute the after tax cost of preferred stock
The pruitt-igoe myth : What role did government play in the creation of the problems that existed in the projects in the United States?
What conclusions can you draw from your findings : What conclusions can you draw from your findings? What recommendations can you make to accounting educators regarding programs that train accountants
Developmental theory : Find an article, video segment, or another type of source in which a developmental theory is discussed, evaluated, demonstrated, etc.

Reviews

Write a Review

Other Subject Questions & Answers

  Define the sexual dysfunctions and paraphilias

the sexual dysfunctions and paraphilias. In addition, it better differentiated diagnostic criteria for children versus adolescents and adults

  Developing the health promotion evidence base

Critically evaluate the educational approach to promoting health, with particular reference to lifestyle drift and Critically consider the main challenges

  Critically analyze information shared from the think tanks

Critically analyze the information shared from the think tanks. What was it, and did you see any problems with the rationale or reasoning utilized?

  Selection of the methodology and design for a study

How and why do the research questions drive the selection of the methodology and design for a study.

  What are some activities that can maintain a positive mood

What are some activities that can maintain a positive mood and reduce a negative mood? For example, does being with friends, viewing a comedy.

  Describe how intelligence analysis may be used by law

Discuss analysis and crime investigative methods that may be used identifying gangs and/or gang activities.

  Have you experienced social loafing or free riding

Have you experienced social loafing or free riding in a team setting? What could have been done or can be done to avoid these effects?

  Different standards of proof reasonable suspicion

Explain the four different standards of proof: reasonable suspicion, probable cause, preponderance of evidence, and beyond a reasonable doubt.

  How model help us to provide cultural competence health care

Please present an essay discussing the Purnell model its framework, assumptions which the model is based and how this model helps us to provide.

  What information about diversity in the united states has

write a 1400- to 1750-word paper that answers the following questionsmiddot what information about diversity in

  How could you use the political process to influence

Explores the various options that are being discussed to address your issue. You will list 5 policy options.

  Suggest the financial ratio that most financial analysts use

Suggest the financial ratio that most financial analysts would use to evaluate the financial condition of the company. Provide support for your rationale.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd