Search results

Jump to navigation Jump to search
View ( | ) (20 | 50 | 100 | 250 | 500)
  • The problem management system should provide for adequate audit trail facilities that allow tracki * All associated configuration items<br> ...
    3 KB (451 words) - 17:52, 5 May 2006
  • =='''Asset Management'''== ...mation security perspective is not just about 'IT' Assets. It is about the management, control and protection of '''all''' aspects of Information / Data in whate ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ves, or from programs, projects or service improvement initiatives. Change Management can ensure standardized methods, processes and procedures are used for all ==Change management in development projects== ...
    4 KB (523 words) - 10:24, 23 April 2010
  • :'''Description of groups, roles, and responsibilities for logical management of network components.'''<br> ...s include a description of groups, roles, and responsibilities for logical management of network components. ...
    2 KB (265 words) - 12:24, 16 June 2010
  • :'''Avoid Session Management Pitfalls:''' [[Media:session-management-security.pdf]]<br> ...actices in Configuration Management for Security:''' [[Media:configuration-management-security.pdf]] <br> ...
    6 KB (839 words) - 16:22, 23 April 2007
  • ==Software Configuration Management== ...re at discrete points in time and to systematically control changes to the configuration for the purpose of maintaining software integrity, traceability, and accoun ...
    22 KB (3,132 words) - 19:07, 17 April 2007
  • '''PO 2.4 Integrity Management'''<br> :::a. SOX.4.1.4: Passwords are required for each user. Password configuration is based on Corporate IT standards.<br> ...
    4 KB (550 words) - 14:34, 1 May 2006
  • ...d systems development methodology should be established and implemented by management. This systems development life cycle (SDLC) describes the stages involved i ...puter operations, which are periodically reviewed, updated and approved by management.<br> ...
    6 KB (804 words) - 12:14, 23 June 2006
  • ::'''PCI-6.5.10:''' Insecure configuration management.<br> ...
    3 KB (346 words) - 14:03, 1 March 2007
  • :'''PCI-2.2 Develop configuration standards for all system components. Make sure these standards address all ...rative access. Use technologies such as SSH, VPN, or SSL/TLS for web-based management and other non-console administrative access.]]<br> ...
    2 KB (283 words) - 17:00, 26 June 2006
  • == Requirement 1: Install and maintain a firewall configuration to protect data. == :'''[[PCI-1.1:|PCI-1.1 Establish firewall configuration standards that include:]]'''<br> ...
    5 KB (702 words) - 12:20, 16 June 2010
  • ...anization can clone and tailor to its unique requirements. Guidelines set configuration or procedural recommendations for the enterprise. They do not have a report :[[Sample Asset Management Policy:|'''Sample Asset Management Standard''']]<br> ...
    4 KB (581 words) - 17:06, 30 December 2013
  • ::*[[Sample Asset Management Policy:|'''Sample Asset Management Policy''']]<br> ...y Assessment and Management Policy:|'''Sample Vulnerability Assessment and Management Policy''']]<br> ...
    10 KB (1,206 words) - 14:05, 1 May 2010
  • [[AI2.5:| 2.5 Configuration and Implementation of Acquired Application Software]]<br> [[AI2.9:| 2.9 Applications Requirements Management]]<br> ...
    3 KB (341 words) - 19:07, 14 June 2007
  • ...rocedures to ensure timely and correct distribution and update of approved configuration items. This involves integrity controls; segregation of duties among those ITIL Service Support, Release Management, 9.3.6 Definitive software library.<br> ...
    3 KB (382 words) - 18:02, 3 May 2006
  • ....8''']] IDS-IPS passwords are required for each administrator ID. Password configuration is based on Corporate IT standards.<br> :a. [[SOX.2.1.5.18:|'''SOX.2.1.5.18''']] Routing protocols are approved by management.<br> ...
    7 KB (901 words) - 13:44, 23 June 2006
  • ===Management commitment to information security=== Management at all levels should actively support security within the organization with ...
    8 KB (996 words) - 12:49, 22 May 2007
  • ...4.8''']] SWITCH passwords are required for each administrator ID. Password configuration is based on Corporate IT standards.<br> :a. [[SOX.2.1.4.18:|'''SOX.2.1.4.18''']] Routing protocols are approved by management.<br> ...
    7 KB (901 words) - 13:43, 23 June 2006
  • Translate business information requirements, IT configuration, information risk action plans and information security culture into an ove ...y policy exists and has been approved by an appropriate level of executive management. ...
    10 KB (1,333 words) - 17:44, 25 June 2006
  • * Statement of general principles and management approach to the use of cryptographic controls ...ough risk assessment, that considers appropriate algorithm selections, key management and other core features of cryptographic implementations ...
    9 KB (1,170 words) - 14:05, 22 May 2007
View ( | ) (20 | 50 | 100 | 250 | 500)