DS3.4:: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
No edit summary
 
(One intermediate revision by the same user not shown)
Line 7: Line 7:
'''Applicability:'''<br>
'''Applicability:'''<br>
<br>
<br>
:: '''Sarbanes-Oxley'''
:: Sarbanes-Oxley
:: HIPAA
:: HIPAA
:: GLBA
:: GLBA
Line 18: Line 18:
<br>
<br>
'''Risk Association Control Activities:'''<br>
'''Risk Association Control Activities:'''<br>
<br>
::'''1. Risk: Management may not be able to trace, review, or monitor systems development effectively.'''
:::a. SOX.1.6: Obtain a copy of the organization's Systems Development Life Cycle (SDLC) methodology. Review the methodology to determine that it addresses security, availability and processing integrity requirements. Consider whether there are appropriate steps to ensure that these requirements are considered throughout the development or acquisition life cycle.
<br>
<br>
'''Implementation Guide:'''<br>
'''Implementation Guide:'''<br>
Line 52: Line 47:
<br>
<br>
'''Supplemental Information:'''<br>
'''Supplemental Information:'''<br>
'''DS 3.4 IT Resources Availability '''<br>
<br>
'''Control Objective:'''<br>
<br>
Provide the required capacity and performance taking into account aspects such as normal workloads, contingencies, storage requirements and IT resource life cycles. Provisions should be made when performance and capacity are not up to the required level such as prioritizing tasks, error tolerance mechanisms and resource allocation practices. Management should ensure that contingency plans properly address availability, capacity and performance of individual IT resources.
<br><br>
'''Applicability:'''<br>
<br>
:: '''Sarbanes-Oxley'''
:: HIPAA
:: GLBA
:: PCI
:: FISMA
:: NIST SP 800-66
:: Ditscap
:: Control Exception
:: User Defined
<br>
'''Risk Association Control Activities:'''<br>
<br>
::'''1. Risk: Management may not be able to trace, review, or monitor systems development effectively.'''
:::a. SOX.1.6: Obtain a copy of the organization's Systems Development Life Cycle (SDLC) methodology. Review the methodology to determine that it addresses security, availability and processing integrity requirements. Consider whether there are appropriate steps to ensure that these requirements are considered throughout the development or acquisition life cycle.
<br>
<br>
'''Implementation Guide:'''<br>
<br>
'''Process Narrative'''<br>
Insert a description of the process narration that is applicable to the existing control statement this narrative refers to.<br>
<br>
'''Process Illustration'''<br>
Insert a process diagram, flowchart or other visual representation here to illustrate the process narrative.<br>
<br>
[[Image:someimage.jpg]]<br>
<br>
'''Control Commentary'''<br>
Insert a description of the control that is applicable to the existing control statement this commentary refers to.<br>
<br>
'''Control Exception Commentary'''<br>
Insert a description of the control exception that is applicable to the existing control statement this commentary refers to.<br>
<br>
'''Evidence Archive Location'''<br>
Insert Evidence Description Here.<br>
<br>
'''Control Status and Auditors Commentary'''<br>
Describe the condition of the applicable control and its effectiveness. Set the color icon to a redlock.jpg, yellowlock.jpg or greenlock.jpg.<br>
<br>
[[Image:redlock.jpg]]<br>
<br>
'''Remediation Plan'''<br>
Insert remediation plan, applicability, or any information that indicates what needs to be done.<br>
<br>
'''Supplemental Information:'''<br>
ITIL Service Delivery, Availability Management<br>
ITIL Service Delivery, Availability Management<br>
ITIL 8.5 Availability planning
ITIL 8.5 Availability planning

Latest revision as of 14:37, 21 June 2006

DS 3.4 IT Resources Availability

Control Objective:

Provide the required capacity and performance taking into account aspects such as normal workloads, contingencies, storage requirements and IT resource life cycles. Provisions should be made when performance and capacity are not up to the required level such as prioritizing tasks, error tolerance mechanisms and resource allocation practices. Management should ensure that contingency plans properly address availability, capacity and performance of individual IT resources.

Applicability:

Sarbanes-Oxley
HIPAA
GLBA
PCI
FISMA
NIST SP 800-66
Ditscap
Control Exception
User Defined


Risk Association Control Activities:

Implementation Guide:

Process Narrative
Insert a description of the process narration that is applicable to the existing control statement this narrative refers to.

Process Illustration
Insert a process diagram, flowchart or other visual representation here to illustrate the process narrative.

File:Someimage.jpg

Control Commentary
Insert a description of the control that is applicable to the existing control statement this commentary refers to.

Control Exception Commentary
Insert a description of the control exception that is applicable to the existing control statement this commentary refers to.

Evidence Archive Location
Insert Evidence Description Here.

Control Status and Auditors Commentary
Describe the condition of the applicable control and its effectiveness. Set the color icon to a redlock.jpg, yellowlock.jpg or greenlock.jpg.

File:Redlock.jpg

Remediation Plan
Insert remediation plan, applicability, or any information that indicates what needs to be done.

Supplemental Information:

ITIL Service Delivery, Availability Management
ITIL 8.5 Availability planning