SlideShare a Scribd company logo
Framework
Security Management Access Controls Contingency Planning Configuration Management
Security Management – Review
and update key security
documentation
Accounts Management – period
reviews to ID and remove generic
and inactive accts on systems and
networks.
Contingency Plan
Baseline
Configuration/Configuration
Settings
Process to ensure contractors
complete Security Authorization
Packages.
Monitor production
environments for individuals with
elevated system privileges
Contingency Plan Testing
Patch and Vulnerability
Management (database
platforms & networks)
Background investigations
Monitoring network and audit
logs and maintain in accordance
with policies.
Alternate Processing
Approved and unapproved
software, process for monitoring,
presenting installation and
removing unauthorized software.
Ensure Position Descriptions are
appropriately marked for position
risk and sensitivity levels.
Backup Testing
Process to ensure closed issues
are adequately supported with
appropriate documentations
Building a house on the right frames
24 Hours
Configuration
Management
Access Control
Contingency
Planning
Security
Management
Vulnerability
Assessment
Auditing

More Related Content

PPT
Network security
PDF
Professional Roles and Responsibilities
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
DOC
Knowedge Skills Ability
PPTX
Automating for NERC CIP-007-5-R1
PPT
NIST 800-37 Certification & Accreditation Process
PPTX
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
Network security
Professional Roles and Responsibilities
Understanding the Risk Management Framework & (ISC)2 CAP Module 1: Exam
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Knowedge Skills Ability
Automating for NERC CIP-007-5-R1
NIST 800-37 Certification & Accreditation Process
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management

What's hot (20)

PDF
Vulnerability Scans & Penetration Test Comparison Chart
DOC
Professional Roles and Responsibilities
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
PDF
Practical IT auditing
PPTX
RMF Roles and Responsibilities (Part 1)
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
PDF
Information Security Continuous Monitoring within a Risk Management Framework
PPTX
Security and Risk management in SDLC Software development Life cycle
DOC
Professional Roles and Responsibilities
PDF
fsp_22Sep15
PDF
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
PPT
PPTX
Ceps departmental environment
PDF
NIST cybersecurity framework
DOCX
Network Security Expert and Risk Analyst
PPT
The security sdlc
PPTX
Geist Presentation
PDF
ClinMetanoia_Single
DOC
01-15a
PPTX
Continual Monitoring
Vulnerability Scans & Penetration Test Comparison Chart
Professional Roles and Responsibilities
Understanding the Risk Management Framework & (ISC)2 CAP Module 6: Categorize
Practical IT auditing
RMF Roles and Responsibilities (Part 1)
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Information Security Continuous Monitoring within a Risk Management Framework
Security and Risk management in SDLC Software development Life cycle
Professional Roles and Responsibilities
fsp_22Sep15
Understanding the Risk Management Framework & (ISC)2 CAP Module 7: Select Con...
Ceps departmental environment
NIST cybersecurity framework
Network Security Expert and Risk Analyst
The security sdlc
Geist Presentation
ClinMetanoia_Single
01-15a
Continual Monitoring
Ad

Similar to Security Framework (20)

DOCX
Risk Assessment
DOCX
R.a 1
DOCX
TEBO NDAGHA cyber resume
PPTX
Critical Controls Of Cyber Defense
PPTX
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
PPTX
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
DOCX
Effects of IT on internal controls
PDF
Security in the Software Development Life Cycle (SDLC)
PPTX
System Administration for security o.pptx
PPT
Audit of it infrastructure
PPT
8. operations security
PDF
Monotype IS Policy Supplement for Information Technology, DevOps, Production ...
PDF
Patch and Vulnerability Management
PPTX
Making PCI V3.0 Business as Usual (BAU)
PDF
system admin for the networking and cyber security.pdf
PDF
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
PDF
OpenText Security Health Check Service
PPTX
Candelaria montague final_project
DOCX
Resume_Mr Herbert A Thompson 10_16_2015
PDF
Ch09 Information Security Best Practices
Risk Assessment
R.a 1
TEBO NDAGHA cyber resume
Critical Controls Of Cyber Defense
Criticalcontrolsofcyberdefensefinal 100128032433 Phpapp02
ICAB - ITA Chapter 5 class 7-8 - Controls and Standards
Effects of IT on internal controls
Security in the Software Development Life Cycle (SDLC)
System Administration for security o.pptx
Audit of it infrastructure
8. operations security
Monotype IS Policy Supplement for Information Technology, DevOps, Production ...
Patch and Vulnerability Management
Making PCI V3.0 Business as Usual (BAU)
system admin for the networking and cyber security.pdf
SynerComm's Tech TV series CIS Top 20 Critical Security Controls #3
OpenText Security Health Check Service
Candelaria montague final_project
Resume_Mr Herbert A Thompson 10_16_2015
Ch09 Information Security Best Practices
Ad

Security Framework

  • 1. Framework Security Management Access Controls Contingency Planning Configuration Management Security Management – Review and update key security documentation Accounts Management – period reviews to ID and remove generic and inactive accts on systems and networks. Contingency Plan Baseline Configuration/Configuration Settings Process to ensure contractors complete Security Authorization Packages. Monitor production environments for individuals with elevated system privileges Contingency Plan Testing Patch and Vulnerability Management (database platforms & networks) Background investigations Monitoring network and audit logs and maintain in accordance with policies. Alternate Processing Approved and unapproved software, process for monitoring, presenting installation and removing unauthorized software. Ensure Position Descriptions are appropriately marked for position risk and sensitivity levels. Backup Testing Process to ensure closed issues are adequately supported with appropriate documentations Building a house on the right frames