Security Policy

Get Started. It's Free
or sign up with your email address
Security Policy by Mind Map: Security Policy

1. Software Inventory

1.1. http://www.lansweeper.com/purchase.aspx

1.2. http://www.spiceworks.com/free-software-inventory-audit-tool/

2. People

2.1. LifeCycle

2.1.1. Entry/New Personnel

2.1.1.1. Briefing

2.1.1.1.1. Creation of Identity and Passwords

2.1.1.1.2. Equipment Handling

2.1.1.2. Type of Personnel

2.1.1.2.1. Developers

2.1.1.2.2. Infra

2.1.1.2.3. AE

2.1.2. Exit

2.1.2.1. Destruction of Identity and Passwords

2.1.2.2. Equipment Handover

2.1.2.2.1. Sanitisation of Equipment

2.2. Violation

2.2.1. Suspension

2.2.2. Termination

2.3. Segregation of Roles

2.3.1. DBA

2.3.2. System Engineer

3. Infrastructure

3.1. Phases

3.1.1. Setup (Defined as Pre-Commissioning)

3.1.1.1. Apps Developer for Initial Setup

3.1.2. Post Commissioning

3.1.2.1. SR Process

3.2. Deployment

3.2.1. Process

3.2.1.1. SR Portal

3.2.1.2. Deployment (Staging) - Verification

3.2.1.3. Deployment (Production) - Verification

3.3. Provisioning

3.3.1. TIM and PIM will be around to commence provisioning

3.4. Incident Management

3.4.1. Taxi

3.4.2. Uber

4. Asset

4.1. Equipment

4.1.1. Permitted Software

4.1.1.1. Managed through AD Policies

4.1.1.2. Dependent on Roles

4.1.1.2.1. Developer

4.1.1.2.2. System Engineer

4.1.1.2.3. Accounts Executive

4.1.2. Management

4.1.2.1. Lifecycle

4.1.2.1.1. Purchase

4.1.2.1.2. Ownership Trail

4.1.2.1.3. Decommissioning

4.1.2.2. Catalog

4.1.3. Management of Tokens

4.1.3.1. Belong to 1 Person (Should not be handed around)

4.1.4. Lost of Equipment

4.1.4.1. Report to IDA

4.2. Software Licenses

4.2.1. Manual Monitoring

4.2.1.1. Non-Critical

4.2.1.2. Expiry

4.2.2. Anti-Virus

4.2.2.1. Cloud Managed

4.3. Audit

4.3.1. Quarterly Audit of Equipment

4.3.2. Quaterly Audit of Licenses

4.4. Data

4.4.1. Folders will be protected based on AD

4.4.2. Categorisation

4.4.2.1. Classified Data

4.4.2.1.1. Customer Database

4.4.2.2. Non-Classified Data

4.4.2.2.1. Documents etc..

5. Office

5.1. Access Logging

6. Software