Search results

Jump to navigation Jump to search
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)
  • '''ME 3.4 Positive Assurance of Compliance'''<br> ...n a timely basis to address any compliance gaps. Integrate IT reporting on compliance progress and status with similar output from other business functions.<br> ...
    2 KB (327 words) - 13:18, 4 May 2006
  • ==Compliance With Legal Requirements== The objective of this category is to ensure compliance with all statutory, regulatory, certificatory or contractual obligations.<b ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat ...<Your Company Name> to gauge and promote end-user awareness of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat ...<Your Company Name> to gauge and promote end-user awareness of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • '''10. Risk: Reactive security monitoring results in data compromise and financial loss or liability.'''<b :a. SOX.4.2.1.10: UNIX administration team is notified when security violations occur.<br> ...
    3 KB (421 words) - 20:20, 12 June 2006
  • ...otification message produced by the system being tested to verify that the security administrators are being proactively notified of possible access violations ...ovide a date, time, source, destination, and responsible entity to satisfy compliance requirements.<br> ...
    3 KB (422 words) - 00:09, 13 June 2006
  • ...ver authorization, authentication, nonrepudiation, data classification and security monitoring may result in inaccurate financial reporting.''' ...security standards has been developed that supports the objectives of the security policy. ...
    3 KB (360 words) - 16:59, 25 June 2006
  • '''PO 4.8 Responsibility for Risk, Security and Compliance'''<br> ...es may need to be assigned at a system-specific level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • '''DS 12.2 Physical Security Measures '''<br> ...ilities for monitoring and procedures for reporting and resolving physical security incidents need to be established. ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''(a)''' The Director shall oversee agency information security policies and practices, by—<br> :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • ...sting templates containing questions that can be used to gauge and promote security awareness in specific areas. The testing can be distributed and responses c ...ity Best Practices and Addressing Regulatory Mandates Testing Template:|'''Security Best Practices and Addressing Regulatory Mandates test Template''']]<br> ...
    2 KB (289 words) - 16:08, 3 August 2006
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...rmation security, including through ensuring timely agency adoption of and compliance with standards promulgated under section 11331 of title 40;<br> ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (303 words) - 17:36, 5 May 2006
  • ...ant risks, encourages cross-divisional co-operation and teamwork, promotes compliance and continuous process improvement, and handles process deviations (includi ...performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements analysis from t ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ...c attention to communicating IT security awareness and the message that IT security is everyone’s responsibility.<br> ...f, information asset owners, etc.) are not informed of or trained in their security responsibilities.'''<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed. ''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (340 words) - 17:40, 5 May 2006
  • ...Security roles are not defined leading to an ineffective implementation of security responsibilities within the organization.'''<br> :::a. SOX.2.7.3: Roles of the security organization and individuals within it are clearly defined and communicated ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ...1:|'''SOX.2.7.1''']] End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed.<br> ITIL Security Management, Security Management Measures.<br> ...
    3 KB (420 words) - 14:06, 8 August 2006
  • ...s responsibility for information security, internal control and regulatory compliance. The level of supervision should be in line with the sensitivity of the pos ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (329 words) - 19:26, 1 May 2006
  • ==Information Security Policy== ...is category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, regulations ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...OX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac ...
    2 KB (291 words) - 16:02, 25 June 2006
  • ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...accepted compliance with the organization’s policies and procedures, e.g., security policies and procedures. ...
    3 KB (385 words) - 16:14, 25 June 2006
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (351 words) - 13:57, 4 May 2006
  • ...ts (NDA), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.<br> ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • '''DS 5.6 Security Incident Definition'''<br> ...ent process. Characteristics include a description of what is considered a security incident and its impact level. A limited number of impact levels are define ...
    4 KB (548 words) - 14:21, 4 May 2006
  • What are assets? Asset Management from a corporate governance and information security perspective is not just about 'IT' Assets. It is about the management, cont ...is taken from and attributable to UK-National Health Services Information Security it I believe adequately covers what we can do/do with data. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...nsurance carriers. Coverage is increasingly available to cover risks from security breaches or denial of service attacks. Several insurance companies offer e '''When evaluating the need for insurance to cover information security threats, financial institutions should understand the following points:''' ...
    3 KB (469 words) - 13:30, 10 April 2007
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    3 KB (451 words) - 17:52, 5 May 2006
  • =='''Information Security Presentation Samples'''== ...anization can use and tailor these presentation samples to support ongoing security awareness and training efforts.<br> ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...ment 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] * [[PCI 11:|'''Requirement 11: Regularly test security systems and processes.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...
    8 KB (996 words) - 12:49, 22 May 2007
  • [[Security Policy:|'''Security Policy''']]<br> [[Organizing Information Security:|'''Organizing Information Security''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ==Personnel Security== ...rs grant legitimate users system access necessary to perform their duties; security personnel enforce access rights in accordance with institution standards. B ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (408 words) - 16:10, 25 June 2006
  • ...ds and guidelines. The policies should address key topics such as quality, security, confidentiality, internal controls and intellectual property. Their releva ...1:|'''SOX.2.7.1''']] End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed.<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • ISO 17799 3.1 Information security policy.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ISO 17799 4.2 Security of third-party access.<br> ISO 17799 6.1 Security in job definition and resourcing.<br> ...
    2 KB (330 words) - 18:17, 1 May 2006
  • ==Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.== ...ging the growth, development and distribution of free, multilingual, cyber security focused educational content, and to providing the full content of this wiki ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...al part of development in house. During the planning stages of development security, availability, and processing integrity must be considered. ...
    2 KB (295 words) - 15:33, 25 June 2006
  • ...dividual users, suppliers, security officers, risk managers, the corporate compliance group, outsourcers and offsite management.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ...design ensuring it enables the business strategy and considers regulatory compliance and continuity requirements. This is related/linked to the information arch ...performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements analysis from t ...
    3 KB (446 words) - 16:36, 1 May 2006
  • ...h agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such ::'''(A)''' testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agenc ...
    4 KB (634 words) - 13:00, 4 June 2010
  • ...h agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such ::'''(A)''' testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agenc ...
    4 KB (682 words) - 19:17, 3 June 2010
  • ...mation technology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published i ...ining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C-I-A tria ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting :::'''(i)''' information security standards promulgated by the Director under section 11331 of title 40; and< ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • == Requirement 12: Maintain a policy that addresses information security. == *A strong security policy sets the security tone for the whole company, and lets employees know what is expected of the ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting :::'''(i)''' information security standards promulgated under section 11331 of title 40; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    4 KB (601 words) - 15:01, 8 August 2006
  • ITIL Security Management<br> ITIL Security Management Measures<br> ...
    4 KB (544 words) - 17:11, 5 May 2006
  • ...control environment and control framework. [[Information_Security_Audit | Security audit]] assessments using industry best practices and benchmarking should b ISO 12.1 Compliance with legal requirements.<br> ...
    2 KB (291 words) - 13:41, 6 March 2007
  • ...accepted compliance with the organization’s policies and procedures, e.g., security policies and procedures • The contracts were reviewed and signed by appropr ...
    3 KB (379 words) - 18:17, 14 June 2006
  • ...t Protection Standard, Company protection standards shall include specific security requirements in the following areas: ## Sample Protection Standards must be reviewed by the Information Security Department to ensure vulnerabilities are not introduced into the Company pr ...
    5 KB (681 words) - 21:56, 15 January 2014
  • ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ISO 17799 4.2 Security of third-party access.<br> ...
    3 KB (459 words) - 17:56, 21 June 2006
  • '''Federal Information Security Management Act (FISMA)''' ...support the implementation of and compliance with the Federal Information Security Management Act including: ...
    9 KB (1,252 words) - 19:19, 19 April 2010
  • ::1. '''Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ISO 4.1 Information security infrastructure<br> ...
    3 KB (366 words) - 18:00, 25 April 2007
  • ...andard computing environments; archival systems; and periodic auditing and compliance checking.<br> ...and procedures are developed as a means of implementing company policy of compliance with all required litigation or other legal holds and with the directives o ...
    9 KB (1,213 words) - 13:20, 9 March 2009
  • ...mation technology - Security techniques - Code of practice for information security management''. ...ining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C-I-A tria ...
    8 KB (1,111 words) - 10:30, 15 April 2012
  • ::1. '''Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ISO 7.2 Equipment security <br> ...
    5 KB (674 words) - 18:14, 21 June 2006
  • ==Data Security== The primary objective of information security is to protect the confidentiality, integrity, and availability of the insti ...
    9 KB (1,246 words) - 18:20, 10 April 2007
  • * PCI-12.5.1 Establish, document, and distribute security policies and procedures. * PCI-12.5.2 Monitor and analyze security alerts and information, and distribute to appropriate personnel. ...
    6 KB (846 words) - 13:52, 4 May 2006
  • ...ecurity]] which in turn grew out of practices and procedures of [[computer security]]. ...ter science. Therefore, IA is best thought of as a superset of information security. ...
    7 KB (983 words) - 10:41, 15 April 2012
  • ::2.) security, 6. Select a sample to determine compliance with the documented procedures. ...
    3 KB (447 words) - 13:36, 23 June 2006
  • ...eats to data integrity, security, availability, [[Privacy | privacy]], and compliance with laws and regulations. Required internal control measures and audit tra ...
    2 KB (269 words) - 23:52, 14 June 2007
  • '''DS 5.5 Security Testing, Surveillance and Monitoring'''<br> ...ly. IT security should be reaccredited periodically to ensure the approved security level is maintained. A logging and monitoring function enables the early de ...
    7 KB (975 words) - 16:57, 9 April 2007
  • ...rtise, and testing. Institutions should determine the appropriate level of security controls based on their assessment of the sensitivity of the information to :* Potential increase in volatility of funds should E-banking security problems negatively impact customer confidence or the market’s perception o ...
    11 KB (1,523 words) - 10:04, 28 April 2007
  • ...e right to obtain a [[Security Freeze]] on their credit reports. Placing a security freeze on a credit report would prohibit credit reporting agencies from rel ...te or keep personal information of state residents are required to comply. Compliance falls under the Attorney General's jurisdiction. Detailed information is a ...
    3 KB (488 words) - 13:02, 12 November 2011
  • ...a law enforcement problem, but poses a serious national and international security threat as well. ...on-site examinations of every FDIC-supervised depository institutions. BSA compliance is a safety and soundness issue due to the reputational, regulatory, legal, ...
    13 KB (1,838 words) - 14:57, 20 April 2007
  • ...dual’s Data, hereinafter the ‘Agency’ is the entity charged with enforcing compliance with the regulation. The Constitutional Court also has jurisdiction to hear * Reporting the technical issues related to the security of the database ...
    4 KB (561 words) - 16:45, 29 August 2014
  • ==Security requirements of information systems== The objective of this category is to ensure that security is an integral part of the organization's information systems, and of the b ...
    9 KB (1,170 words) - 14:05, 22 May 2007
  • ...ive, detective and corrective measures are in place (especially up-to-date security patches and virus control) across the organization to protect information s ::'''3. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...
    8 KB (1,177 words) - 19:00, 25 June 2006
  • ...ntation in line with business requirements and the continuity plan. Verify compliance with the backup procedures, and verify the ability to and time required for ::'''2. Risk: Security and business continuity risks are introduced by technical designs incompati ...
    3 KB (471 words) - 12:32, 23 June 2006
  • ...vide solutions that can automate this audit process and streamline ongoing compliance efforts.<br> ...trol and governance that influence a wide variety of factors, ranging from security to IP risk mitigation. In other words, well-run projects (whether nonprofit ...
    11 KB (1,601 words) - 12:58, 10 April 2007
  • ...[[risk management]]. The rising interest in IT governance is partly due to compliance initiatives, for instance [[Sarbanes-Oxley]] in the USA and Basel II in Eur ...ems and IT controls. Whilst [[risk management|managing risk]] and ensuring compliance are essential components of good governance, it is more important to be foc ...
    12 KB (1,686 words) - 11:47, 30 May 2015
  • :* Information Security :* SP-10; Control And Security Risks in Electronic Imaging Systems, December 1993<br> ...
    15 KB (2,060 words) - 17:47, 15 June 2007
  • ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...or the continuation of external party access in the case of an information security incident; ...
    21 KB (3,010 words) - 15:52, 25 June 2006
  • ...and Reinvestment Act of 2009 (ARRA) and sets forth a federal standard for security breach notifications relating to the unauthorized dissemination of protecte ...s, use or disclosure of protected health information which compromises the security or privacy of such information, except where an unauthorized person to whom ...
    9 KB (1,358 words) - 16:25, 6 September 2011
  • ...uested by user management, approved by system owner and implemented by the security-responsible person. User identities and access rights are maintained in a c ::1. '''Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    6 KB (870 words) - 18:08, 21 June 2006
  • :* Support customer requirements, including compliance issues. ...on of managers, users, administrators, application designers, auditors and security staff, and specialist skills in areas such as insurance and risk management ...
    9 KB (1,301 words) - 16:55, 25 April 2007
  • #[[5 Steps to Compliance: Building an Automated Data Map | 5 Steps to Compliance: Building an Automated Data Map]] #[[Amazon Web Services Security White Paper | Amazon Web Services Security White Paper]] ...
    16 KB (2,124 words) - 11:06, 16 March 2010
  • ...force the security controls we need to comply with the companies corporate security policy.<br> * Authorization and user security administration ...
    18 KB (2,920 words) - 17:59, 18 May 2007
  • ...as agreed upon by the parties (in the privacy notice or otherwise) and in compliance with the Law. * Where justified for purposes of national security, public order, public health, or for the protection of third party rights, ...
    18 KB (2,869 words) - 17:46, 29 August 2014
  • In terms of compliance, the key rules under the Act include ''The Financial Privacy Rule'' which ...e a policy in place to protect the information from foreseeable threats in security and data integrity ...
    15 KB (2,184 words) - 17:02, 15 June 2007
  • ...and overlaps), ownership, maturity, performance measurement, improvement, compliance, quality targets and plans to achieve them. It provides integration among t * ISO 17799 4.1 Information security infrastructure.<br> ...
    5 KB (699 words) - 19:59, 25 June 2006
  • :::*Evaluate security risks and consequences.<br> :::C. Discuss security goals (e.g., confidentiality, integrity, availability.).<br> ...
    12 KB (1,656 words) - 14:15, 1 May 2010
  • '''Protection standard''' refers to the required system and security configuration for a network device, system, or application.<br> '''System Security Accreditation''' refers to the formal authorization for system operation an ...
    16 KB (2,312 words) - 14:14, 1 May 2010
  • ...tions may opt to have their BCMS objectively and independently audited for compliance with the standard, leading to certification. The certificate assures stake ...ngdom Accreditation Service (UKAS) are authorized to verify organizations' compliance with part 2 and issue recognized certificates. Certification involves a mu ...
    7 KB (1,040 words) - 10:48, 27 October 2012
  • ::* Regulatory, audit, and security reports from key service providers ...rts, resolution of audit findings, format and contents of work papers, and security over audit materials.<br> ...
    32 KB (4,518 words) - 17:53, 11 April 2007
  • ...f inherent risk and the intended level of control risk applied against the compliance sample size table contained in Part 3 of the Financial Condition Examiners ...
    8 KB (1,155 words) - 20:14, 25 June 2006
  • [[PO4.8:| 4.8 Responsibility for Risk, Security and Compliance]]<br> ...
    4 KB (517 words) - 19:07, 14 June 2007
  • ...ated Company policies are first accepted and subsequent Company supporting security, privacy and risk technology and processes are fully implemented. ...y Technology Resources if it adversely impacts the intended performance of security software, data leakage controls and risk mitigating controls implemented by ...
    10 KB (1,433 words) - 18:15, 14 January 2014
  • ...that policies and procedures are effective, and that employees operate in compliance with approved policies. Auditors should identify weaknesses, review managem ...the [[Sample_Third_Party_Security_Awareness_Standard:|Sample Third Party Security Awareness Standard]] policy example.<br> ...
    28 KB (4,089 words) - 14:37, 16 April 2007
  • ...g its 50 states. (California alone has more than 25 state privacy and data security laws). These laws address particular problems or industries. They are too d ...sed this authority to pursue companies that fail to implement minimal data security measures or fail to live up to promises in privacy policies. ...
    14 KB (2,027 words) - 15:57, 29 August 2014
  • The Administration Simplification provisions also address the security and privacy of health data. The standards are meant to improve the efficien ...security-rule/ Health Insurance Portability and Accountability Act (HIPAA) Security Rule]. The audit framework is available for purchase to implement it in you ...
    32 KB (4,732 words) - 19:36, 29 November 2013
  • # Security of personal information; and ...monitor the development of new wireless services, along with the privacy, security, advertising, and other consumer protection issues they raise. See http://w ...
    31 KB (4,666 words) - 13:19, 26 April 2011
  • Oracle's security by default is not extremely good. For example, Oracle will allow users to c ...prehensive audit examination that has stood up to many professional Oracle compliance audits on UNIX and Linux platforms.<br> ...
    22 KB (3,612 words) - 16:20, 15 November 2007
  • # Security—collected data should be kept secure from any potential abuses; The responsibility for compliance rests on the shoulders of the "controller", meaning the natural person or J ...
    15 KB (2,297 words) - 16:59, 21 September 2011
  • ...g by such Secretary. Authorizes the Secretary to waive such standards when compliance would adversely affect the mission of a computer operator or cause a major ...itle E:''' National Security Systems - Excludes, with exceptions, national security systems from the provisions of this title.<br> ...
    10 KB (1,502 words) - 19:27, 4 April 2010
  • ...A expressly require organizations to appoint an individual responsible for compliance with the obligations under the respective statutes. ...s accountable for the protection of that personal information and ensuring compliance with the applicable legislation. ...
    18 KB (2,700 words) - 16:17, 29 August 2014
View (previous 100 | ) (20 | 50 | 100 | 250 | 500)