Infosec Programs
Policies and procedures: Required as the basis to enforce IRM mandate.
General procedures: Policies on acceptable use, electronic communication, web access, patching etc
Platform configuration standards: Secure configurations for Unix, Windows etc.
Control catalog
Awareness and training programs
Access controls and privilege management: all individuals and services are properly authenticated, authorized and audited.
Vulnerability management:
Patching
Vulnerability monitoring and response
Testing for vulnerabilities: Network penetration testing, web application testing, and code analysis
Threat management and incidence response
SIEM and log analysis
Threat intel feeds – monitoring and absorption
Incidence handling and response
Risk assessments
New ventures
New code in the DMZ
All varieties of control exemptions
Compliance
Regulators
External auditors
SSAE16
Privacy and security
Tools and operations
IDS/IPS
Firewalls
Proxies
System log analysis tools
Penetration testing tools, and web application testing tools
Security data warehouse: for reports, risk dashboards and items to follow up on
Workticket management tools
Board reporting
Business resilence
Last updated