# Infosec Programs

1. Policies and procedures: Required as the basis to enforce IRM mandate.
   1. General procedures: Policies on acceptable use, electronic communication, web access, patching etc
   2. Platform configuration standards: Secure configurations for Unix, Windows etc.
   3. Control catalog
2. Awareness and training programs
3. Access controls and privilege management: all individuals and services are properly authenticated, authorized and audited.
4. Vulnerability management:
5. Patching
6. Vulnerability monitoring and response
7. Testing for vulnerabilities: Network penetration testing, web application testing, and code analysis
8. Threat management and incidence response
   1. SIEM and log analysis
   2. Threat intel feeds – monitoring and absorption
   3. Incidence handling and response
9. Risk assessments
10. New ventures
11. New code in the DMZ
12. All varieties of control exemptions
13. Compliance
14. Regulators
15. External auditors
16. SSAE16
17. Privacy and security
18. Tools and operations
    1. IDS/IPS
    2. Firewalls
    3. Proxies
    4. System log analysis tools
    5. Penetration testing tools, and web application testing tools
    6. Security data warehouse: for reports, risk dashboards and items to follow up on
    7. Workticket management tools
19. Board reporting
20. Business resilence
