ITIL Based Service Level Management if SLAs Cover Security
|
|
|
- Bonnie Pope
- 10 years ago
- Views:
Transcription
1 ITIL Based Service Level if SLAs Cover Security Tomas FEGLAR International Consultant in Information Systems Research and Architecture Vondrousova 1199, Prague 6, Czech Republic ABSTRACT Current level of information technology creates new perspectives for more IT service oriented market. Quality of these services requires slightly different approach then was applied for products including software. No IT services are delivered and supported in risk free environment. Risks would be considered consistently with IT services quality gaps from Service Level (SLM) perspective. SLM is one of ITIL modules that are widely used within the IT service industry. We identified some weaknesses in how SLM is developed in ITIL environment if service level agreement (SLA) has cover Security. We argue that in such cases Architecture modeling and risk assessment approach let us effectively control analytical effort that relates to risks identification and understanding. Risk driven countermeasures designed in a next step (Risk treatment) have significant impact to the SLM especially from responsibility perspective. To demonstrate SLM s importance in real practice we analyze SLA synthesize process in CCI (Cyber Critical Infrastructure) environment. Keywords: Architecture framework, ITIL, Service level management, Service level agreement, Risk analysis and management, Security, CCI. 1. INTRODUCTION Proportionally increasing importance of a digital economy more and more IT services become specific products that are sold and purchased. This specificity multiplies in a context of CCI, such as power distribution, water supply, national defense, and emergency services, because these infrastructures are managed over increasingly interconnected electronic networks. Mechanisms behind these specific IT service businesses are mostly intuitive; services are non tangible and their influences on business processes are not clearly understood. Service level agreements between business process owners or customers and service providers have weaknesses that become visible only when something happened and business process is disrupted. A lot of effort mostly in the area of risk analysis and risk management was spent to avoid such situations. The problem is that methods used by risk analyst are abstract without clear links to something that is more familiar to customers, service providers and suppliers. It was a challenge for us to develop new methodology CAF (Component Architecture Framework) that allows overcoming gaps between various perspectives. This paper describes three concepts that can be developed using CAF and that significantly simplify service level management in situations when SLAs deal with security. Section 2 describes five service quality gaps as were published by Zeithaml and Bitner [20] and Niessink and Van Vliet [13]. These quality gaps are completed with five risks; it allows us better understanding of environment in which services produced by service provides are delivered to customers who purchase them. Section 3 describes service delivery as a set of ITIL modules that were developed under leadership of the Central Computer and Telecommunication Agency (CCTA). We enhanced 10 originally developed ITIL modules with additional two RARM (Risk Analysis and Risk ) module and SECM (Security ) module. Such modification allows us better understanding of SLM and RARM process relationships. Section 4 dives into relationships between SLM and RARM modules. We argue that combined approach using architecture modeling and risk assessment stimulates common understanding of all SLM participants. The result is a comprehensive set of service level agreements that corresponds to responsibilities delegated by service provider to suppliers and to responsibilities of own employees. To demonstrate SLA criticality in real practice we included additional three sections in our paper. Section 5 describes hybrid enterprise management and control concept, section 6 comments information security and environmental management standards, and section 7 shows an application of architecture and risk assessment modeling based SLM for CCI protecting. The conclusion and future work are presented in the section HOW RISKS RELATE TO SERVICE QUALITY GAPS We start with popular gap model [14] and slightly change it with risks (Fig. 1). Now we can describe quality gaps and risks by the similar way. SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4 61
2 GAP 5 RISK 5 Expected Service (Risk free) Expected Service (Controlled risks) CUSTOMER Perceived Service (Disruptions, Incidents,..) SERVICE PROVIDER Service Delivery System Support GAP 4 RISK 4 External Communications to Customers ITIL GAP 3 RISK 3 GAP 1 RISK 1 Service Designs and Standards GAP 2 RISK 2 Company perceptions of expected service Figure 1: Risk and Service Quality Gaps The difference between the perceived quality of the service and the expected quality (GAP 5) is a result of four other gaps [20,13]: GAP 1: The expected service as perceived by the service provider differs from the service as expected by the customer. For example, the service organization aims to satisfy certain availability constrains (e.g. 99% availability), while the actual customer concerns with maximum downtime. GAP 2: The service specification as used by the service provider differs from the expected service as perceived by the service provider. For example, the customer expects a quick restart of the system, while the standard procedure of the maintenance organization is focused on analyzing the reason for the crash. GAP3: The actual service delivery differs from the specified services. For example, customer bypasses the help desk by phoning the maintainer system directly. GAP 4: Communication about the service does not match the actual service delivery. For example, a customer is not informed about the repair of a bug he or she reported. The difference between the perceived risk of the service and the expected risk (RISK 5) is a result of four other risks: RISK 1: Understanding of impact by service provider differs from customer. Customer usually underestimates dependencies between its business processes and their dependency on IT services. RISK 2: Caused by a lack of customer-driven security concept, absence of risk assessment method and its regular usage for a periodical risk identification, analysis and evaluation. RISK 3: Service delivery does not include effective countermeasures that correspond to risks. Some countermeasures are not relevant, some are missing and it s not clear who is responsible for what and what sanctions have to be applied. RISK 4: Communication by the service provider about its delivered services does not include options that could meet customers security needs. Cost of these options cannot be compared with customers impacts (value of business processes) and it negatively influences both sites. The fifth risk is caused by he four preceding risks. Closing the first four risks we can increase perceived service security (as an service quality enhancement feature), thus bringing the perceived service in line with expected service ( Risk free property is changed into Controlled risks ). To close the risks a service provider needs to: a) Help customer to identify its assets by the way that allows overcoming differences among business process (source of impact assessment), information processes and information technology (RISK 1). b) Help customer with Security Concept establishment including risk assessment method (RISK 2). 62 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4
3 c) Ensure that risk treatment is a part of security concept and allows optimizing countermeasures including clearly specified role based responsibility (RISK 3). d) Re designing services and modification of SLAs (with customers) and contracts (with suppliers) (RISK4). 3. SLM AND ITIL ENVIRONMENT IT Infrastructure Library describes a set of well practices organized in modules. The British government through their Central Computer and Telecommunication Agency (CCTA) originally developed them. Five of these modules cover Service Delivery area and other five cover Service Support (Fig. 2). RARM module and SECM module were not developed as separate ITIL modules, but we have included them into our ITIL environment for the following reasons: CCTA developed very powerful Risk Analysis and Method CRAMM [6] that can be easily integrated into ITIL environment (as a RARM module). Later version of this method was redesigned in accordance with ISO/IEC 17799[1], and BS 7799 Part 2:2002 [2]. Almost every organization or company maintains information security. Big differences are in how Security is applied. SECM module included in our ITIL environment is developed and synchronized with RARM module. Its primary mission is controlling security-operating procedures that relate to System Support. SLM module [5] helps development relationships between IT Service Section (organization entity responsible for SLM) and end user (customer) and service suppliers and/or maintainers. SLAs relate to users (customers) and describe type of end user services (EUS) delivered to customers and delivery conditions. SERVICE DELIVERY Availability (AM) Service Level (SLM) Cost for IT Services (COSTM) Capacity (CAPM) Risk Analysis and Risk (RARM) Continuity (CONTM) SYSTEM SUPPORT Configuration Security (SECM) Change Help Desk SW Configuration and Control Problem SOP - Security Operating Procedures Figure 2: Service Delivery and System Support SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4 63
4 Contracts relate to suppliers/maintainers and describe services and/or products needed for EUS delivery. SLA generates requirements to other service delivery modules particularly: Availability (AM) module [3] covers whole availability lifecycle that has to be established to guarantee SLA availability requirements RARM module covers whole risk analysis and management life cycle that has to be established to guarantee SLA security requirements Cost (COSTM) module [4] allows calculation of incomes (customers payments) versus actual running costs of the IT services Cost development considers additional relationships between ITIL modules: EUS delivery infrastructure includes networks (Local, Metropolitan, Wide). Optimal design and planning of this infrastructure significantly influences performance (throughput) / cost ratio. Capacity (CAPM) module is responsible for these tasks Continuity (Recovery) (CONTM) module allows avoiding potential impacts (like loss of revenue, political embarrassment, etc.) of EUS disruptions. CONTM module development uses results of RARM module. RARM module allows development of security concept on very detailed level. Implementation of such concept through SECM module especially in large organizations requires relatively long time (one year or more in dependency on a security budget). 4. ARCHITECTURE MODELING AND RISK ASSESSMENT Despite Risk analysis and management process operates with objects business context, business data, business processes, business applications, business assets [11] - many organizations understand these objects more intuitively then formally. Intuitively based approach isolates risk analysts (responsible for risk assessment) from business owner and information specialist. Risk analysis and management process becomes more tedious, less understandable for businessmen and more expensive. To avoid these difficulties we developed new methodology CAF [8] that harmonizes Risk analysis and management process with architecture modeling (Fig. 3). Architecture modeling uses Zachman s architecture framework [19,17]. Six points characterize interaction between both processes. First five points (I1 I5) deal with synthesis of an Asset Model mapping architecture elements into assets that are familiar to risk analyst. Six s point deals with backward mapping of security operating procedures (generated on the base of identified risks) into PEOPLE column of architecture framework with a resolution to a role or a user. Architecture modeling risk analysis and management interactions can be summarized as follows: I1 Impact Assessment controls consistency between Business owner (a person understanding business process), IT staff understanding system process and risk analyst. This assessment is a critical part of assets evaluation step that is a part of risk analysis stage. Our understanding of business influences investigation of an impact from viewpoint of the possible consequences for customers (personal safety, law enforcement, financial loss, commercial and economic interest, international relations, etc.). I2 - DATA and APPL asset classes correspond to non-tangible assets that relate to system entity and system process. We evaluate both these classes in terms of unavailability (for different timeframes), destruction, disclosure and modification. I3 - EUS asset class corresponds to functional links that connect source of EUS (site in which application is running) with a point of end user service delivery. I4 AC1 AC3 asset classes correspond to modules and components that are critical for application running and EUS delivery. These classes can include servers, network distributions components (routers, hubs, modems), protocols, etc. I5 SITE corresponds to an environment where all modules and components are situated. Fig. 3 illustrates only one such link between AC1 (this asset class represents application server) and a SITE a place where application server is really placed. We can also change a resolution level (SITE -> BUILDING -> ROOM). All previous interactions direct from architecture model to risk analysis and management process. It is reasonable to think about opposite direction when we finish with risk analysis (risk treatment) stage. I6 A Role and/or a User correspond to responsibility that is one of key results of a risk management. Security Operating Procedures (SOP are synthesized within risk management stage) are assigned to roles (users) in accordance with organization structure. This process has critical impact to the SLM, particularly: Suppliers contracts: SOP responsibilities have to be assigned to external suppliers and maintainers Employment contracts: SOP responsibilities have to be assigned to employees. 5. HYBRID ENTERPRISE MANAGEMENT AND CONTROL SYSTEMS CONCEPT Transportation, Water, Emergency Services, Energy, Telecommunication and other sectors mentioned in Presidential Decision Directive 63 (PDD 63) have specific technological infrastructure that includes Cyber Critical Infrastructure (CCI) and technology producing primary products or services (electric power, telecommunication services for example). The CCI combines three subsystems (Fig. 4): Control and (CM) sub-system Enterprise Information System (EIS) Strategic Decision and Planning (SDP) sub-system EIS Operational sub-system CM and EIS Operational sub-systems are distributed across large territory but are functionally coupled with EIS SDP in the Enterprise and Control (EMC) node [7]. 64 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4
5 DATA FUNCTION NETWORK PEOPLE SCOPE Entity List Process List Location List Organization List ENTERPRISE MODEL Business Entity Business Process Enterprise Location(s) Organization I1 IMPACT ASSESSMENT SYSTEM MODEL System Entity System Process Site(s), F. Links Role TECHNO MODEL Data Set Application C. Points C. Links User COMPO- NENTS Modules / Components ZACHMAN FRAMEWORK F.Links - Functional links C. Points - Connection Points I2 I3 I4 I5 C.Links - Communication links I6 DATA EUS AC 1 AC 2 AC 3 Threats. Vulnerabilities and Risks Assessment Risks Driven Countermeasure Generation APPL AC 1 ASSET MODEL SITE RISK ANALYSIS (ASSESSMENT ) RISK MANAGEMENT (TREATMENT ) Figure 3: Architecture Modeling and Risk Assessment SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4 65
6 CM Sub-system Availability and Integrity EIS SDP Sub-system Confidentiality Enterprise and Control (EMC) EIS Operational Sub-system ISO/IEC 17799: EUS 21 2 EUS 31 3 APPL 1 APPL 2 APPL 3 DATA 11 DATA 21 DATA 31 S1 LNDC 1 S2 LNDC 2 S3 LNDC 3 BS :2002 DN 2 RCN 1 NDC 21 NDC 22 RNDC 1 RC 11 4 Internet or VPTN Remote Controller Work producing primary products or services DN 1 NDC 11 NDC 12 Distribution Control and (CM) Sub-system EIS Strategic Decision and Planning (SDP) Sub-system EIS Operational Sub-system ally critical business process under direct control of the CCI BS :2002 DN 3 Business Partner Delivery Infrastructure BPN 1 NDC 31 NDC 32 EUS 31 LNDC 10 RS 1 Figure 4: A Hybrid Enterprise and Control Systems Concept CM sub-system consists of: Remote Controller s (RCN) that directly control Work s producing primary products or services (air traffic monitoring and control, gas transition and purchasing, radioactive waste processing (in case of the NPS)). Each RCN consists at least from a Remote Controller (RC), a Remote Network Distribution Component (RNDC) and an End User Service () representing a particular functionality managed by a central application (APPL 1). Delivery Infrastructure. A part of this infrastructure can be owned and controlled by a company (that provides its key business activities in one of PDD 63 sectors). This part consists of Distribution s (DN); each DN includes at least a couple of Network Distribution Components (NDC) and manages traffic and data flows. NDCs are used in all company s sites that are connected to the Internet. Second part of the Delivery Infrastructure includes Internet or a Virtual Private Telecommunication Network (VPTN); this part is fully transparent for a particular company. CM sub-system situated in the EMC node. This subsystem includes running application (APPL 1) with data (DATA 11) that are a source of a particular EUS (EUS 11). A minimal hardware environment includes a Server (S1) and a Local Network Distribution Component (LNDC 1) that connects CM sub-system with DN and with other sub-systems within EMC node. Work nodes are a part of environmentally critical business process. Well understanding of this criticality is very important for CCI risk analysis and requires special methods allowing explicit description of a criticality in terms of impacts. EIS Operational sub-system manages supporting activities in which Business to Business transactions become more and more important. This sub-system consists of: The Operational part situated in the EMC node. This part includes running application and data (APPL 3 and DATA 3) that produce End User Service (EUS 31). A minimal hardware environment includes a Server (S3) and a LNDC SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4
7 Delivery Infrastructure. It is the same infrastructure that is used as a part of the CM sub-system. Business Partners s (BPN). These nodes run a particular EUS (EUS 31) that is functionally synchronized with the application running at the EMC node (APPL 3). A minimal hardware environment includes a Remote Server (RS) and LNDC (LNDC 10). EIS SDP sub-system uses information from other two subsystems and transforms them into a form suitable for strategic decisions. Application (APPL 2) and data part (DATA 21) of this system differs from CM and Control sub-systems and uses On-Line Analytic Processing (OLAP) instead of On- Line Transaction Processing (OLTP). EUS (EUS 21) is a typical service needed by staff responsible for strategic decisions and planning. The Concept in the Fig. 4 represents high-level view of the Cyber Critical Infrastructures (CCI) that require special protection in accordance with the Department of Homeland Security (DHS) CIP (Critical Infrastructure Protection) strategy [9]. Hybrid Enterprise Information and Control Systems Concept is a new approach. We develop it for following reasons: Control systems were understood for a long time as integral part of primary production process that has nothing common with other information systems. Nowadays this standpoint is not appropriate (especially in the CCI context) and too costly - instead of wellstructured ISO/IEC a proprietary approach is more expensive and less effective [1] Information security management standardization effort represented by ISO/IEC becomes more and more important in electronic business but very little attention is given to hybrid systems More and more organizations over the world deploy their al management in accordance with ISO [12]. It is a not easy process; it also in many aspects duplicates effort that has to be spent by organization and deal with ISO/IEC INFORMATION SECURITY AND ENVIRONMENTAL MANAGEMENT STANDARDS The Committee responsible for a British information security standardization development identified environmental management standard ISO uses a model referred to as Plan-Do-Check-Act model or PDCA for short. The newly published revised Part 2 of BS 7799 (BS :2002) applied this model also for Information Security Systems (ISMS) [2]. PDCA based harmonization between BS :2002 and ISO 14001:1996 is great idea that allows organization significantly improve efficiency of its information and environmental management strategy. Overall correspondence between both standards includes nine areas: Introduction, Scope, Normative reference, Terms and definitions, ISMS/EMS requirements, responsibility, Resource management,, review, and Improvement. Planning phase is the most critical harmonization part it influences all other phases that follow. This phase is much better for an ISMS (BS 7799) then for an EMS (ISO 14001) and could be used as an etalon for environmental planning. The ISMS planning phase consists of five parts. a) Introduction. The plan activity is designed to ensure that the context and scope for the ISMS have been correctly established, that all information security risks are identified and assessed, and that a plan for the appropriate treatment of these risks is developed. b) Information security policy. Requires the organization and its management to define the information security policy that includes a framework for setting its objectives and targets, and establishes an overall sense of direction and principles for action with regard to information security. c) Scope of the ISMS. The ISMS would cover all parts that relate to the CCI. Dependencies, interfaces and assumptions concerning the boundaries CM, EIS SDP and EIS operational sub-systems need to be clearly identified. A concept shown in the figure 1 has to be developed and divided in some way, for example into domains to make subsequent risk management tasks simpler. Primary attention should be paid to the primary business process identification and impact assessment, evaluation of their CCI dependencies and to the CCI asset modeling. d) Risk Identification and Assessment. The risks assessment documentation should explain which risk assessment approach has been chosen, and why this approach is appropriate to the CCI security requirements, the primary business processes environment and the risks the organization faces. The approach adopted should aim to focus security effort and resources in a cost-effective and efficient way. Primary attention should be paid to the identification of threats and vulnerabilities, assessment of threats exploiting vulnerabilities, calculation of risks based on the results of the assessment, and identification of residual risks. Risk treatment plan. Organizations should create a detailed risk treatment plan, showing for each identified risk recommended countermeasures including time frame over which they to be implemented, already implemented countermeasures, and role / personal responsibilities. Acceptable level of risk needs to be identified. Scope description and asset identification and valuation have to be developed in close contact with business owners who are familiar with business processes. In practice business owners are not experts on a business processes environment (IT infrastructure and its environment). Threat / Vulnerability assessment and risk analysis is abstract job usually under responsibility of Risk Analyst. Risk Manager uses risk profiles (outputs from risk analysis) for a design and implementation of the most effective risk treatment strategy. The Hybrid Enterprise and Control Systems concept is appropriate architecture approach to the CCI scope definition and asset modeling. It can be used as a starting point of a CCI security project. 7. AN APPLICATION OF ARCHITECTURE MODELING AND RISK ASSESSMENT BASED SLM FOR CCI PROTECTION The Concept in the Fig. 4 also includes basic recommendation concerning of a strategic security decision: CM sub-system processes small amount of timely sensitive data that could have critical impact on Work s. The level of impact is tightly coupled with primary products and services and could be very large in SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4 67
8 dependency on circumstances. Availability and Integrity are key security features that have to be guarantee in this system. EIS Operational sub-system has to be acceptable by all business-to-business participants on the base of a unique set of criteria. ISO/IEC standard is just a way to achieve this kind of security. Automation of a primary and supporting business processes accelerates accumulation of business information and allows its transformation to enterprise knowledge that is a subject of interest of competitors, foreign intelligence and so on. Confidentiality is a key feature that characterizes EIS SDP sub-system. Last year GAO expanded high risks areas monitored since 1997 with risks of information systems that support American nation s critical infrastructures such as national defense, power distribution, telecommunications, and water supply [10]. This effort was a reaction to significant information weaknesses identified in 24 agencies in the year The analyses showed that weaknesses were most often identified for security program management and access control. In accordance with NIST a successful IT security program has to be based on an effective risk analysis and management (RARM) process [18]. RARM process for CCI described in the figure 4 is usually very complex and time consumption. To achieve appropriate modeling performance we have chosen CRAMM CCTA Risk Analysis and Method /CCTA/ [6]. This method is very powerful from modeling point of view and allows generation security products in accordance with ISO/IEC 17799[1], and BS 7799 Part 2:2002 [2]. Left site in the figure 5 describes CM sub-system that is mapped to the Asset Threat - Risk Model. CM Sub-system Availability and Integrity Asset Threat Risk Model APPL 1 EMC ASSET MODEL (DATA, APPL, EUS, CPD) *1) THREATS T1 T2 T3 T4 T5 DATA 11 DATA S1 LNDC 1 APPL 1 RP11 Distribution DN 1 NDC 11 NDC 12 RP21 RP31 Delivery Infrastructure BS :2002 DN 2 NDC 21 EMC DN 1 LNDC NDC RISKS RP41 RP51 RP42 RP52 NDC 22 DN 2 NDC RP43 RP53 RCN 1 RNDC 1 Remote Controller RCN 1 RNDC 1 RP44 RP54 RC 11 Work producing primary products or services 4 *1) CCI Asset Model includes all critical CCI assets and linkages among them Risk Landscape Figure 5: CCI / Asset Threat Risk Model Mapping 68 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4
9 A mapping in the figure 5 integrates three parts: All critical components necessary for controlling of a Work, particularly data, application, end user service and CCI critical path delivery (CPD) components. Threats (T) include analyzed threats, particularly T1 Unauthorized Use of Application, T2 Communication Infiltration, T3 Technical Failure of Server, T4 Floods Damage, T5 Terrorism. A Risk landscape that captures risks combining the level of threats / vulnerabilities with possible loss which may result from accident, attack or disaster. Left site in the figure 6 describes the same CM sub-system as in the figure 5; it is mapped to the Asset Countermeasure Model. Because Asset model is the same for both, Risk Landscape in the figure 5 and Countermeasure Landscape in the figure 6, it allows easy monitoring how risks are covered by countermeasures. Both, risks profiles and risk driven countermeasures are associated with the same assets. Model mapping in the figure 6 integrates three parts: All critical components necessary for controlling of a Work, particularly data, application, end user service and CCI critical path delivery (CPD) components. Countermeasures recommended for a protection (RC) on the base of a risk landscape, particularly system testing, data integrity over networks, accommodation moves, terrorist / extremist warnings and many others. A countermeasure landscape in which beyond each RCD symbol (Recommended Countermeasure Description) detailed description of countermeasure is placed (including its effectiveness, cost, and so on). CM Sub-system Availability and Integrity APPL 1 EMC Asset Countermeasure model (Risk Driven) Recommended Countermeasures RC1 RC2 RC3 RC4 RC5 ASSET MODEL (DATA, *1) APPL, EUS, CPD) DATA 11 DATA S1 LNDC 1 APPL 1 RCD11 Distribution DN 1 NDC 11 NDC 12 RCD21 RCD31 Delivery Infrastructure BS :2002 DN 2 NDC 21 EMC DN 1 LNDC NDC COUNTERMEASURE RCD41 RCD51 RCD42 RCD52 NDC 22 DN 2 NDC RCD43 RCD53 RCN 1 RNDC 1 Remote Controller RCN 1 RNDC 1 RCD44 RCD54 RCD Recommended Countermeasure Description RC 11 ISO :1996 Work producing primary products or services 4 *1) CCI Asset Model includes all critical CCI assets and linkages among them Countermeasure Landscape Figure 6: CCI / Asset Countermeasure Model Mapping SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4 69
10 CCI Asset Threat Risk Mapping and CCI Asset Countermeasure Mapping allows strong engineering based approach to the SLA synthesize ( figure 7): a) A Scope Definition is based on the common Hybrid Enterprise and Control Systems Concept this approach directly influences a design of an asset models. b) Impact assessment that is a key part of Asset Identification and Valuation consider as a main source of impact disruption of a primary production process through work nodes managed by remote controllers. c) Threat Vulnerability Assessment consider a relationships between potential threats and asset model that replaces a real CM sub-system. d) All three steps mentioned above create a risk landscape (output from Risk Analysis step) that can be used for specific decision making (for example acceptable risks). Well understandable risk landscape allows starting risk management, oriented to the decreasing of detected risk into acceptable level with an optimized set of countermeasures. e) Outputs from Risk Analysis and Risk steps are further processed in a Responsibility Assignment step, which associates acceptable risks and risk management / treatment tasks with responsibilities. Responsibilities are further split among companies (for example power distribution company that is in a position of business process owner) and company s staff and external suppliers like telecommunication operators, application service providers, and so on. Scope Definition Assets Identification and Valuation Threat and Vulnerability Assessment Risk Analysis Risk Approved Risk Landscape Approved Countermeasure Landscape Responsibility Assigment Service Level SLA s Package Figure 7: Synthesize of SLAs Considering Risks Threaten Business Processes in CCI 70 SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4
11 f) Service Level is a final step in the whole process; it generates an SLA s package using results of a Responsibility Assignment step. 8. CONCLUSION AND FUTURE WORK Presented topic illustrates very flexible modeling that could be easily customized for broad ranges of SLA synthesize scenarios. From this perspective following topics seems to be interesting for further research: a) Development of CAF techniques allowing business process owners better understanding of dependencies of their core business activities on IT services and IT infrastructure. These methods must involve them into the process of impact assessment, the process of a residual risk landscape understanding and making decisions concerning acceptable risks and in the process of active participation in responsibilities assignment and SLA specification. b) Development of CAF techniques allowing IT service providers better and more precise threats / vulnerabilities identification and evaluation, risk landscape modeling and countermeasure landscape optimization. There is also broad area for particular topics like Assurance/Cost dilemma and Recovery Strategy establishment (see figure 2). Assurance/Cost dilemma needs systematic investigation. ITIL based concept does not include mechanism that allows controlling a process of continual improvement of an assurance like CCM and SSE CCM [15,16]. Recovery strategy, recovery options, backups, insurance and continuity planning represent a group of countermeasures that relate to CONTM module (figure 2). Continuity establishment has direct impact to a cost (COSTM module). REFERENCES [1] BS ISO/IEC 17799:2000, Information technology Code of practice for information security management. [2] BS :2002, Information security management Part 2: Specification for information security management systems. [3] CCTA, Availability, IT Infrastructure Library, ISBN [4] CCTA, Cost for IT Services, IT Infrastructure Library, ISBN [5] CCTA, Service Level, IT Infrastructure Library, ISBN [6] CCTA, The CRAMM Risk Analysis and Method, Crown Copyright, CCTA IT Security and Privacy Group, London, 1991, 245 p. [7] R.F. Dacey: Critical Infrastructure Protection. Challenges in Securing Control Systems, [8] T. Feglar, Component Architecture Framework (CAF) Methodology and Tools, [9] GAO. Homeland Security: Information Sharing Responsibilities, Challenges, and Key Issues, GAO T, [10] GAO: Protecting Information Systems Supporting the Federal Government and the Nation s Critical Infrastructures, High Risk Series, January 2003, GAO [11] ISO :1996 CMITS - Concept and models for IT security [12] ISO 14001:1996: al Systems: Specification with guidance for use. [13] F. Niessink, H. Van Vliet, Software Maintenance from a Service Perspective, Journal of Software Maintenance: Research and Practice, Vol. 12, N. 2, March/April 2000, pp [14] A. Parasuraman, V.A. Zeithaml, L.L. Berry, A Conceptual Model of Service Quality and its Implication for Future Research, Journal of Marketing, Vol. 49, pp , [15] SEI, The Capability Maturity Model: Guidelines for Improving the Software Process, Software Engineering Institute, Carnegie Mellon University, SEI Series in Software Engineering, Addison-Wesley Publishing Company, Reading, Mass., 441 p [16] SEI, Systems Security Engineering Capability Maturity Model SSE CCM, Version 3.0, Software Engineering Institute, Carnegie Mellon University, 340 p., June, [17] Sowa, J., F., Zachman, J.A. Extending and formalizing the framework for information systems architecture, IBM Systems Journal, Vol. 31, N. 3, [18] Stonebuner,G., Goguen,A., Feringa,A.: Risk Guide for Information Technology Systems, NIST Special Publication [19] Zachman, J.A., A framework for information systems architecture, BM Systems Journal, Vol. 26, N. 3, 1987,1999 [20] Zeithaml, V.A., Bitner,M.J., Service Marketing, McGraw-Hill, New York, NY, 700p SYSTEMICS, CYBERNETICS AND INFORMATICS VOLUME 3 - NUMBER 4 71
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
Integrated Information Management Systems
Integrated Information Management Systems Ludk Novák [email protected] ANECT a.s. Brno, Czech Republic Abstract The article tries to find consensus in these tree different types of the systems the
Recent Advances in Automatic Control, Information and Communications
Proposal of the improvement of actual ITIL version based on comparative IT Service Management methodologies and standards The implementation of IT Service Management frameworks and standards Anel Tanovic*,
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
ITIL Essentials Study Guide
ITIL Essentials Study Guide Introduction Service Support Functions: Service Desk Incident Management Problem Management Change Management Configuration Management Release Management Service Delivery Functions:
National Infrastructure Protection Center
National Infrastructure Protection Center Risk Management: An Essential Guide to Protecting Critical Assets November 2002 Summary As organizations increase security measures and attempt to identify vulnerabilities
EXIN IT Service Management Foundation based on ISO/IEC 20000
Sample Exam EXIN IT Service Management Foundation Edition October 2013 Copyright 2013 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Service Improvement. Part 3 The Strategic View. [email protected] http://www.is.ed.ac.uk/itil
Service Improvement Part 3 The Strategic View [email protected] http://www.is.ed.ac.uk/itil Service Management House Customers Avail. Mgmt Capacity Mgmt Service Level Mgmt Continuity Mgmt Financial
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Open Certification Framework. Vision Statement
Open Certification Framework Vision Statement Jim Reavis and Daniele Catteddu August 2012 BACKGROUND The Cloud Security Alliance has identified gaps within the IT ecosystem that are inhibiting market adoption
Research on Operation Management under the Environment of Cloud Computing Data Center
, pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering
Storage Management Within the NEW ITIL Version 3 Context. Dr. D. Akira Robinson, IT Governance Management, Ltd. Dept of Navy
Storage Management Within the NEW ITIL Version 3 Context Dr. D. Akira Robinson, IT Governance Management, Ltd. Dept of Navy Why ITIL? Total dependence on Information Technology Need to deal with complexity
ITIL V3 Application Support Volume 1
ITIL V3 Application Support Volume 1 Service Management For Application Support ITIL is a Registered Trade Mark and Community Trademark of the Office of Government and Commerce. This document may contain
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.
IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
University of Central Florida Class Specification Administrative and Professional. Information Security Officer
Information Security Officer Job Code: 2534 Serve as the information security officer for the University. Develop and computer security system standards, policies, and procedures. Serve as technical team
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
April 8, 2013. Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899
Salt River Project P.O. Box 52025 Mail Stop: CUN204 Phoenix, AZ 85072 2025 Phone: (602) 236 6011 Fax: (602) 629 7988 [email protected] James J. Costello Director, Enterprise IT Security April 8,
Introduction: ITIL Version 3 and the ITIL Process Map V3
Introduction: ITIL Version 3 and the ITIL Process Map V3 IT Process Maps www.it-processmaps.com IT Process Know-How out of a Box IT Process Maps GbR, 2009-2 - Contents HISTORY OF ITIL... 4 The Beginnings...
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
for Oil & Gas Industry
Wipro s Upstream Storage Solution for Oil & Gas Industry 1 www.wipro.com/industryresearch TABLE OF CONTENTS Executive summary 3 Business Appreciation of Upstream Storage Challenges...4 Wipro s Upstream
Service Catalog. it s Managed Plan Service Catalog
Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE
END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE About M 2 TD M2 TD is a wholly black Owned IT Consulting Business. M 2 TD is a provider of data center consulting and managed services. In a rapidly changing
WHITE PAPER December, 2008
INTRODUCTION Key to most IT organization s ongoing success is the leadership team s ability to anticipate, plan for, and adapt to change. With ever changing business/mission requirements, customer/user
CTR System Report - 2008 FISMA
CTR System Report - 2008 FISMA February 27, 2009 TABLE of CONTENTS BACKGROUND AND OBJECTIVES... 5 BACKGROUND... 5 OBJECTIVES... 6 Classes and Families of Security Controls... 6 Control Classes... 7 Control
The IBM Solution Architecture for Energy and Utilities Framework
IBM Solution Architecture for Energy and Utilities Framework Accelerating Solutions for Smarter Utilities The IBM Solution Architecture for Energy and Utilities Framework Providing a foundation for solutions
Business Cases for Brocade Software-Defined Networking Use Cases
Business Cases for Brocade Software-Defined Networking Use Cases Executive Summary Service providers (SP) revenue growth rates have failed to keep pace with their increased traffic growth and related expenses,
INFORMATION TECHNOLOGY SECURITY STANDARDS
INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK
SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK BACKGROUND The National Institute of Standards and Technology (NIST) Special Publication 800-53 defines a comprehensive set of controls that is the basis
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
WHITE PAPER. iet ITSM Enables Enhanced Service Management
iet ITSM Enables Enhanced Service Management iet ITSM Enables Enhanced Service Management Need for IT Service Management The focus within the vast majority of large and medium-size companies has shifted
Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL).
ITIL-aligned solutions White paper Use product solutions from IBM Tivoli software to align with the best practices of the Information Technology Infrastructure Library (ITIL). January 2005 2 Contents 2
Five best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Security and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
An introduction to ITIL concepts
An introduction to ITIL concepts Written by Justin Murray October 2005 Introduction... 2 Objective... 2 The ITIL books and processes... 3 Service Management: a key part of ITIL... 4 Service Support...
Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000
Preparation Guide Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000 Edition June 2015 Copyright 2015 EXIN All rights reserved. No part of this publication may be published,
ISO27001 Controls and Objectives
Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the
IT Service Management with System Center Service Manager
Course 10965B: IT Service Management with System Center Service Manager Course Details Course Outline Module 1: Service Management Overview Effective IT Service Management includes process driven methodologies
Preparation Guide. IT Service Management Foundation Bridge based on ISO/IEC 20000
Preparation Guide IT Service Management Foundation Bridge based on ISO/IEC 20000 Edition April 2011 Copyright 2011 EXIN All rights reserved. No part of this publication may be published, reproduced, copied
Nuclear Plant Information Security A Management Overview
Nuclear Plant Information Security A Management Overview The diagram above is a typical (simplified) Infosec Architecture Model for a nuclear power plant. The fully-developed model would, for example,
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
BADM 590 IT Governance, Information Trust, and Risk Management
BADM 590 IT Governance, Information Trust, and Risk Management Information Technology Infrastructure Library (ITIL) Spring 2007 By Po-Kun (Dennis), Tseng Abstract: This report is focusing on ITIL framework,
WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services
APPLICATION OF INFORMATION TECHNOLOGY SERVICE MANAGEMENT WITHIN SELECTED LOGISTICS AND TRANSPORT SERVICES
Proceedings of the 13 th International Conference Reliability and Statistics in Transportation and Communication (RelStat 13), 16 19 October 2013, Riga, Latvia, p. 363 369. ISBN 978-9984-818-58-0 Transport
1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services
1. Computer Security: An Introduction Definitions Security threats and analysis Types of security controls Security services Mar 2012 ICS413 network security 1 1.1 Definitions A computer security system
IT Service Management with System Center Service Manager
Course 10965B: IT Service Management with System Center Service Manager Page 1 of 9 IT Service Management with System Center Service Manager Course 10965B: 3 days; Instructor-Led Introduction This Three-day
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
An ITIL Perspective for Storage Resource Management
An ITIL Perspective for Storage Resource Management BJ Klingenberg, IBM Greg Van Hise, IBM Abstract Providing an ITIL perspective to storage resource management supports the consistent integration of storage
ITL BULLETIN FOR JANUARY 2011
ITL BULLETIN FOR JANUARY 2011 INTERNET PROTOCOL VERSION 6 (IPv6): NIST GUIDELINES HELP ORGANIZATIONS MANAGE THE SECURE DEPLOYMENT OF THE NEW NETWORK PROTOCOL Shirley Radack, Editor Computer Security Division
White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
Highland Council Information Security Policy
Highland Council Information Security Policy Document Owner: Vicki Nairn, Head of Digital Transformation Page 1 of 16 Contents 1. Document Control... 4 Version History... 4 Document Authors... 4 Distribution...
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Sytorus Information Security Assessment Overview
Sytorus Information Assessment Overview Contents Contents 2 Section 1: Our Understanding of the challenge 3 1 The Challenge 4 Section 2: IT-CMF 5 2 The IT-CMF 6 Section 3: Information Management (ISM)
Security Software Engineering: Do it the right way
Proceedings of the 6th WSEAS Int. Conf. on Software Engineering, Parallel and Distributed Systems, Corfu Island, Greece, February 16-19, 2007 19 Security Software Engineering: Do it the right way Ahmad
Exhibit E - Support & Service Definitions. v1.11 / 2015-07-03
Exhibit E - Support & Service Definitions v1.11 / 2015-07-03 Introduction - Support Services Table of Contents 1 Introduction... 4 2 General Definitions... 5 2.1 Support Services... 5 2.2 2.3 License or
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery WHITE PAPER
BACKUP IS DEAD: Introducing the Data Protection Lifecycle, a new paradigm for data protection and recovery Despite decades of research and development into backup and data protection, enterprise customers
Information and Communication Technology. Patch Management Policy
BELA-BELA LOCAL MUNICIPALITY - - Chris Hani Drive, Bela- Bela, Limpopo. Private Bag x 1609 - BELA-BELA 0480 - Tel: 014 736 8000 Fax: 014 736 3288 - Website: www.belabela.gov.za - - OFFICE OF THE MUNICIPAL
ENTERPRISE IT SERVICE MANAGEMENT BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR. Ocotber 2012
S T A T E O F C O N N E C T I C U T BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR ENTERPRISE IT SERVICE MANAGEMENT (Featuring Numara Footprints Service and Asset Management)
Information Technology Governance. Steve Crutchley CEO - Consult2Comply www.consult2comply.com
Information Technology Governance Steve Crutchley CEO - Consult2Comply www.consult2comply.com What is IT Governance? Information Technology Governance, IT Governance is a subset discipline of Corporate
Building a Service Catalog: A Practical Approach to get to an Actionable State with your Service Catalog - Part 1 15 October 2008
Building a Service Catalog: A Practical Approach to get to an Actionable State with your Service Catalog - Part 1 Agenda 2:30 2:45 Introductions and Overview 2:45 3:45 Service Catalog Overview 3:45 4:00
Logicalis Managed Service Strategy & Support. Geraldine Moatti Proposition Manager, Services
Logicalis Managed Service Strategy & Support Geraldine Moatti Proposition Manager, Services 1 I don t want to be a Technology Operator Or how do I deliver business differentiation? Support business growth
ITIL - QUICK REFERENCE GUIDE
http://www.tutorialspoint.com/itil/itil_quick_guide.htm ITIL - QUICK REFERENCE GUIDE Copyright tutorialspoint.com ITIL Overview ITIL is a framework providing best practice guidelines on all aspects of
Security Controls in Service Management
Interested in learning more about security? SANS Institute InfoSec Reading Room This paper is from the SANS Institute Reading Room site. Reposting is not permitted without express written permission. Security
WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach
WHAT DOES IT SERVICE MANAGEMENT LOOK LIKE IN THE CLOUD? An ITIL based approach Marc Jansen Computer Science Institute University of Applied Sciences Ruhr West Tannenstr. 43, 46240 Bottrop Germany [email protected]
Information Technology Auditing for Non-IT Specialist
Information Technology Auditing for Non-IT Specialist IIA Pittsburgh Chapter October 4, 2010 Agenda Introductions What are General Computer Controls? Auditing IT processes controls Understanding and evaluating
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Preside. Increasing deregulation in the telecommunications
Portfolio Brief Nortel Networks Preside Solutions for IP Networks and Services Dial Access Management Overcome outsourcing challenges, capture the richness of call details and manage multiple RAS-enabled
Cloud security architecture
ericsson White paper Uen 284 23-3244 January 2015 Cloud security architecture from process to deployment The Trust Engine concept and logical cloud security architecture presented in this paper provide
Understanding changes to the Trust Services Principles for SOC 2 reporting
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Understanding changes to the Trust Services Principles for SOC 2 reporting
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE
ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE JANUARY 2015 U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector Cybersecurity Framework Implementation
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes
T141 Computer Systems Technician MTCU Code 50505 Program Learning Outcomes Synopsis of the Vocational Learning Outcomes * The graduate has reliably demonstrated the ability to 1. analyze and resolve information
Risk Management Guide for Information Technology Systems. NIST SP800-30 Overview
Risk Management Guide for Information Technology Systems NIST SP800-30 Overview 1 Risk Management Process that allows IT managers to balance operational and economic costs of protective measures and achieve
GAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
IBM Service Management solutions White paper. Make ITIL actionable with Tivoli software.
IBM Service solutions White paper Make ITIL actionable with Tivoli software. June 2008 2 Contents 2 Introduction 3 ITIL: best practices for best results 4 Support ITIL best practices with comprehensive
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT
A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT Chandramohan Muniraman, University of Houston-Victoria, [email protected] Meledath Damodaran, University of Houston-Victoria, [email protected]
Strategic Plan FY 2014-2016
Strategic Plan FY 2014-2016 CONTENTS SUMMARY 3 ACADEMIC SERVICES 4 DATA MANAGEMENT & REPORTING 6 COMMUNICATIONS & COLLABORATION 7 IT SERVICES 8 INFRASTRUCTURE 9 SECURITY 10 BRAND BUILDING 11 INITIATION
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Network Configuration Management
Network Configuration Management Contents Abstract Best Practices for Configuration Management What is Configuration Management? FCAPS Configuration Management Operational Issues IT Infrastructure Library
Essential NCPI Management Requirements for Next Generation Data Centers
Essential NCPI Requirements for Next Generation Data Centers By Ted Ives White Paper #14 1 Executive Summary The management of physical infrastructure in data centers can no longer be considered independently
IT Architecture Review. ISACA Conference Fall 2003
IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
