Used to provide a comprehensive security management framework for the organization | Policies, standards, baselines, guidelines, procedures
IT Governance
Defines the role of security inside of an organization and establishes the desired end state for that security program | Organizational, system-specific, issue-specific
Policy
Provides framework to meet the business goals and define the roles, responsibilities, and terms associated with it
Organizational
Addresses the security of a specific technology, application, network, or computer system
System-specific
Addresses a specific security issue such as email privacy, employee termination procedures, or other specific issues
Issue-specific
Implements a policy in an organization
Standard
creates a reference point in network architecture and design
Baseline
Recommended action that allows for exceptions and allowances in unique situations
Guideline
Detailed step-by-step instructions created to ensure personnel can perform a given task or series of actions
Procedure
Shows the actual physical arrangement of the components that make up the network
Physical Network Diagram
lllustrates the flow of data across a network and shows how devices communicate with each other
Logical Network Diagram
Labels which cables are connected to which ports
Wiring Diagram
Planning and designing a wireless network to deliver the required wireless solution
Radio Frequency (Wireless) Site Survey
Determines if a site has the right amount of power, space, and cooling to support a new upgrade or installation
Wired Site survey
Delivered after a formal assessment has been conducted
Audit and Assessment Report
Set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on
Baseline Configurations
Changes will be properly tested and approved to be part of the new baseline
Systematic approach to the governance and realization of value of things over their life cycle | Tangible assets, intangible assets
Asset Management
Asset management is a systematic process of:
Development, operation, maintenance, upgrade, disposal
A database system allows for the detailed management and configurations of assets
With asset management how do you uniquely identify each and every workstation out there?
Unique Asset Tag - A barcode or a radio frequency ID tag that’s going to be assigned to that particular device and labeled onto it
Unique Asset ID
Establish good change management practices
Procurement Lifecycle - Birth to death of an asset
What are the change management procedures?
Change Request - Verifies business impact
Procurement - Determines the budget
Deployment - Implements procedures in a secure configurations
Maintenance/Operations - Implements procedures for monitoring and support
Disposal - Implements procedures for sanitizing data remnants