SlideShare a Scribd company logo
Cyber Governance
Control Objective Statement - Controls provide reasonable assurance that the information
system is adequately designed, implemented, administered and maintained by qualified I.T.
personnel. Controls allow access to information based on clear and enforced policies to
preserved integrity and protect informational resources and the network infrastructure from
unauthorized access .
Regulations
(ex. PIPEDA,
PCI DSS, SOX)
Management
Policy (ex. Information Protection)
Example of statement we can find in this type of policy
Statement: a subject or an object must only be granted access to Information he has the need to know/use
according to its role or requirements (ex. Services). Adequate preventive, detective and corrective operational,
management, technical and physical controls must be present, in good working order and verified periodically to
ensure their effectiveness.
Internal
Requirements
(ex. Business
Continuity)
Architecture
According to the policy statement, a standard can be defined
Process with role and responsibility (ex. employee, contractor, third party);
Collaborate with IT Operation to develop standard practices;
Objects accessing the organizational information system, internally and externally (ex. services);
Network and security architecture (ex. segregation, zones);
IT Security requirements to be followed by operation while implementing the control (ex. Detailed configuration of
a solution).
IT Control Framework
Author: Marc-Andre Heroux
Version 1.1
Date: 11/01/2016
Classified: public
Document realized
according to guidance
from the following
organizations:
A control objective is a Governance statement setting
the direction in regards to IT, security as well as other
functions of the organization. They are mainly
formulated according to internal requirements and
regulations to comply with.
Information Protection Policy
Information protection policy is a document which expresses
management direction and support for information security
on the processing, storage and transmission of
sensitive information. Main goal is to ensure information is
adequately protected from modification or disclosure.
**Recommended to be signed by every employee
**Availability is usually under Business continuity
management policy
Procedures can describe step by step specific task to be executed (ex. firmware
upgrade). Practices can describe how to conduct the operation, but are not step by step
document such as procedures; it allows activities to be conducted in a similar way.
Operation
Implementation of a control according the architecture/standard defined
IT Operation implement , operate, maintain and monitor the control.

More Related Content

PPT
Information Assurance And Security - Chapter 2 - Lesson 1
PPT
Lesson 1 - Introduction
PPT
Information Assurance And Security - Chapter 1 - Lesson 1
PPT
Information Assurance And Security - Chapter 1 - Lesson 2
PPT
Information Assurance And Security - Chapter 1 - Lesson 4
PPT
Information Assurance And Security - Chapter 1 - Lesson 3
Information Assurance And Security - Chapter 2 - Lesson 1
Lesson 1 - Introduction
Information Assurance And Security - Chapter 1 - Lesson 1
Information Assurance And Security - Chapter 1 - Lesson 2
Information Assurance And Security - Chapter 1 - Lesson 4
Information Assurance And Security - Chapter 1 - Lesson 3

What's hot (20)

PPT
Lesson 1 - Technical Controls
PPT
Chapter 5 Planning for Security-students.ppt
PPTX
Information Security
PPT
Introduction to information security - by Ivan Nganda
PPTX
CISSP Certification- Security Engineering-part1
PPT
Network security policies
PPTX
Chapter 4 Risk Management.pptx
PPT
Lesson 2 Cryptography tools
PPT
Lesson 3- Fair Approach
PPTX
IT Governance Roles and Data Governance - Hernan Huwyler
PDF
ISO_27001___2005_OASIS
PPT
Developing an Information Security Program
DOC
Information security
PPT
Security Management Practices
PPTX
Legal-Ethical-Professionalin-IS.pptx
Lesson 1 - Technical Controls
Chapter 5 Planning for Security-students.ppt
Information Security
Introduction to information security - by Ivan Nganda
CISSP Certification- Security Engineering-part1
Network security policies
Chapter 4 Risk Management.pptx
Lesson 2 Cryptography tools
Lesson 3- Fair Approach
IT Governance Roles and Data Governance - Hernan Huwyler
ISO_27001___2005_OASIS
Developing an Information Security Program
Information security
Security Management Practices
Legal-Ethical-Professionalin-IS.pptx
Ad

Similar to IT Control Framework (20)

PDF
Protecting business interests with policies for it asset management it-tool...
PPT
Policy formation and enforcement.ppt
PDF
Multi agents system service based platform in telecommunication security inci...
PDF
A to Z of Information Security Management
PPT
Information security policy_2011
PPT
Information security policy_2011
DOCX
Organizations rely heavily on the use of information technology (IT).docx
DOCX
11What is Security 1.1 Introduction The central role of co.docx
DOCX
Information Systems Security & Strategy
PPTX
Funda mental of information CHAPTER TWO.pptx
PDF
Ch06 Policy
PDF
Fundamentals of data security policy in i.t. management it-toolkits
PPTX
Security management.pptx
DOCX
To meet the requirements for lab 10 you were to perform Part 1, S
DOCX
Security policy case study
PDF
Ise viii-information and network security [10 is835]-solution
PPT
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
PDF
A Practical Approach to Managing Information System Risk
PDF
1.1 Data Security Presentation.pdf
DOCX
Operationaland Organizational SecurityChapter 3Princ.docx
Protecting business interests with policies for it asset management it-tool...
Policy formation and enforcement.ppt
Multi agents system service based platform in telecommunication security inci...
A to Z of Information Security Management
Information security policy_2011
Information security policy_2011
Organizations rely heavily on the use of information technology (IT).docx
11What is Security 1.1 Introduction The central role of co.docx
Information Systems Security & Strategy
Funda mental of information CHAPTER TWO.pptx
Ch06 Policy
Fundamentals of data security policy in i.t. management it-toolkits
Security management.pptx
To meet the requirements for lab 10 you were to perform Part 1, S
Security policy case study
Ise viii-information and network security [10 is835]-solution
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
A Practical Approach to Managing Information System Risk
1.1 Data Security Presentation.pdf
Operationaland Organizational SecurityChapter 3Princ.docx
Ad

More from Marc-Andre Heroux (9)

PPTX
Linux encrypted container
PPTX
Enterprise Security Critical Security Functions version 1.0
PPTX
Online Authentication
PDF
Monitoring your organization against threats - Critical System Control
PPTX
Frame - MAC Address Threats & Vulnerabilities
PPTX
Modèle de sécurité organisationnelle
PPT
Méthodologie - adoption d'une norme en 7 étapes
PPTX
BUSINESS MATURITY LIFE CYCLE
PPTX
Assurance compliance management system
Linux encrypted container
Enterprise Security Critical Security Functions version 1.0
Online Authentication
Monitoring your organization against threats - Critical System Control
Frame - MAC Address Threats & Vulnerabilities
Modèle de sécurité organisationnelle
Méthodologie - adoption d'une norme en 7 étapes
BUSINESS MATURITY LIFE CYCLE
Assurance compliance management system

Recently uploaded (20)

PPTX
BASIC H2S TRAINING for oil and gas industries
PDF
Joshua Moll on Leadership & Mindset..pdf
PDF
Certified Information Systems Security Professional (CISSP) Specialization Ce...
PPTX
Management and Leadership across culture at McDonald's
PPTX
Organisational behaviour_ managerial applications of perception
PPTX
WORLD TRADE ORAGANIZATION- INSTITUTION TO MANAGE TRADE BETWEEN NATIONS
PDF
Boost the power of design | Design Impulse
PPTX
Leading, its definiton, example, and types.pptx
PPTX
Time Management 2 power point presentation
PPTX
Spotlight on road Injury in the Philippines
PDF
The Untold Story of Swami Vijay Kumar Durai: Building PRS International
PPTX
_ISO_Presentation_ISO 9001 and 45001.pptx
PDF
TED Talk on how to make TED Talk slides.pdf
PPT
Operations Management Supply-Chain Management
PDF
250816-Risk Evaluation & Mitigation Strategy-CQS.pdf
PPTX
Testing center of excellence how to, why required
PPTX
Presentation on Housekeeping Issue @RP.pptx
PPTX
4 5 6 7 Intro to Ramayan MANAGEMENT LESSONS and Qualities.pptx
PDF
How to Present a Project Proposal to Stakeholders for Approval?
PPTX
Ryan Daly Gallardo Prod Management PPT .pptx
BASIC H2S TRAINING for oil and gas industries
Joshua Moll on Leadership & Mindset..pdf
Certified Information Systems Security Professional (CISSP) Specialization Ce...
Management and Leadership across culture at McDonald's
Organisational behaviour_ managerial applications of perception
WORLD TRADE ORAGANIZATION- INSTITUTION TO MANAGE TRADE BETWEEN NATIONS
Boost the power of design | Design Impulse
Leading, its definiton, example, and types.pptx
Time Management 2 power point presentation
Spotlight on road Injury in the Philippines
The Untold Story of Swami Vijay Kumar Durai: Building PRS International
_ISO_Presentation_ISO 9001 and 45001.pptx
TED Talk on how to make TED Talk slides.pdf
Operations Management Supply-Chain Management
250816-Risk Evaluation & Mitigation Strategy-CQS.pdf
Testing center of excellence how to, why required
Presentation on Housekeeping Issue @RP.pptx
4 5 6 7 Intro to Ramayan MANAGEMENT LESSONS and Qualities.pptx
How to Present a Project Proposal to Stakeholders for Approval?
Ryan Daly Gallardo Prod Management PPT .pptx

IT Control Framework

  • 1. Cyber Governance Control Objective Statement - Controls provide reasonable assurance that the information system is adequately designed, implemented, administered and maintained by qualified I.T. personnel. Controls allow access to information based on clear and enforced policies to preserved integrity and protect informational resources and the network infrastructure from unauthorized access . Regulations (ex. PIPEDA, PCI DSS, SOX) Management Policy (ex. Information Protection) Example of statement we can find in this type of policy Statement: a subject or an object must only be granted access to Information he has the need to know/use according to its role or requirements (ex. Services). Adequate preventive, detective and corrective operational, management, technical and physical controls must be present, in good working order and verified periodically to ensure their effectiveness. Internal Requirements (ex. Business Continuity) Architecture According to the policy statement, a standard can be defined Process with role and responsibility (ex. employee, contractor, third party); Collaborate with IT Operation to develop standard practices; Objects accessing the organizational information system, internally and externally (ex. services); Network and security architecture (ex. segregation, zones); IT Security requirements to be followed by operation while implementing the control (ex. Detailed configuration of a solution). IT Control Framework Author: Marc-Andre Heroux Version 1.1 Date: 11/01/2016 Classified: public Document realized according to guidance from the following organizations: A control objective is a Governance statement setting the direction in regards to IT, security as well as other functions of the organization. They are mainly formulated according to internal requirements and regulations to comply with. Information Protection Policy Information protection policy is a document which expresses management direction and support for information security on the processing, storage and transmission of sensitive information. Main goal is to ensure information is adequately protected from modification or disclosure. **Recommended to be signed by every employee **Availability is usually under Business continuity management policy Procedures can describe step by step specific task to be executed (ex. firmware upgrade). Practices can describe how to conduct the operation, but are not step by step document such as procedures; it allows activities to be conducted in a similar way. Operation Implementation of a control according the architecture/standard defined IT Operation implement , operate, maintain and monitor the control.