Search results

Jump to navigation Jump to search
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)
  • '''ME 3.4 Positive Assurance of Compliance'''<br> ...n a timely basis to address any compliance gaps. Integrate IT reporting on compliance progress and status with similar output from other business functions.<br> ...
    2 KB (327 words) - 13:18, 4 May 2006
  • ==Compliance With Legal Requirements== The objective of this category is to ensure compliance with all statutory, regulatory, certificatory or contractual obligations.<b ...
    6 KB (774 words) - 12:41, 25 May 2007
  • '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat ...<Your Company Name> to gauge and promote end-user awareness of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (318 words) - 16:08, 3 August 2006
  • '''Security Best Practices and Addressing Regulatory Mandates Awareness Testing Templat ...<Your Company Name> to gauge and promote end-user awareness of regulatory compliance solutions through the establishment of effective policy and standards.<br> ...
    2 KB (322 words) - 16:10, 3 August 2006
  • '''10. Risk: Reactive security monitoring results in data compromise and financial loss or liability.'''<b :a. SOX.4.2.1.10: UNIX administration team is notified when security violations occur.<br> ...
    3 KB (421 words) - 20:20, 12 June 2006
  • ...otification message produced by the system being tested to verify that the security administrators are being proactively notified of possible access violations ...ovide a date, time, source, destination, and responsible entity to satisfy compliance requirements.<br> ...
    3 KB (422 words) - 00:09, 13 June 2006
  • ...ver authorization, authentication, nonrepudiation, data classification and security monitoring may result in inaccurate financial reporting.''' ...security standards has been developed that supports the objectives of the security policy. ...
    3 KB (360 words) - 16:59, 25 June 2006
  • '''PO 4.8 Responsibility for Risk, Security and Compliance'''<br> ...es may need to be assigned at a system-specific level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk ...
    3 KB (370 words) - 18:04, 1 May 2006
  • ...controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.<br> :*'''[[Security Policy:|'''Security Policy''']]<br> ...
    8 KB (1,023 words) - 17:25, 24 October 2006
  • '''DS 12.2 Physical Security Measures '''<br> ...ilities for monitoring and procedures for reporting and resolving physical security incidents need to be established. ...
    4 KB (517 words) - 18:12, 21 June 2006
  • '''(a)''' The Director shall oversee agency information security policies and practices, by—<br> :'''(1)''' promulgating information security standards under section 11331 of title 40;<br> ...
    3 KB (414 words) - 11:45, 4 June 2010
  • ...sting templates containing questions that can be used to gauge and promote security awareness in specific areas. The testing can be distributed and responses c ...ity Best Practices and Addressing Regulatory Mandates Testing Template:|'''Security Best Practices and Addressing Regulatory Mandates test Template''']]<br> ...
    2 KB (289 words) - 16:08, 3 August 2006
  • '''(a)''' In General.— The Director shall oversee agency information security policies and practices, including—<br> ...rmation security, including through ensuring timely agency adoption of and compliance with standards promulgated under section 11331 of title 40;<br> ...
    4 KB (671 words) - 10:44, 1 June 2010
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (303 words) - 17:36, 5 May 2006
  • ...ant risks, encourages cross-divisional co-operation and teamwork, promotes compliance and continuous process improvement, and handles process deviations (includi ...performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements analysis from t ...
    4 KB (580 words) - 18:00, 23 June 2006
  • ...c attention to communicating IT security awareness and the message that IT security is everyone’s responsibility.<br> ...f, information asset owners, etc.) are not informed of or trained in their security responsibilities.'''<br> ...
    3 KB (442 words) - 18:58, 1 May 2006
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed. ''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (340 words) - 17:40, 5 May 2006
  • ...Security roles are not defined leading to an ineffective implementation of security responsibilities within the organization.'''<br> :::a. SOX.2.7.3: Roles of the security organization and individuals within it are clearly defined and communicated ...
    3 KB (427 words) - 17:58, 1 May 2006
  • ...1:|'''SOX.2.7.1''']] End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed.<br> ITIL Security Management, Security Management Measures.<br> ...
    3 KB (420 words) - 14:06, 8 August 2006
  • ...s responsibility for information security, internal control and regulatory compliance. The level of supervision should be in line with the sensitivity of the pos ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (329 words) - 19:26, 1 May 2006
  • ==Information Security Policy== ...is category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, regulations ...
    8 KB (1,063 words) - 13:25, 23 May 2007
  • ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...OX.1.24:|'''SOX.1.24''']] Third-party service contracts address the risks, security controls and procedures for information systems and networks in the contrac ...
    2 KB (291 words) - 16:02, 25 June 2006
  • ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...accepted compliance with the organization’s policies and procedures, e.g., security policies and procedures. ...
    3 KB (385 words) - 16:14, 25 June 2006
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    2 KB (351 words) - 13:57, 4 May 2006
  • ...ts (NDA), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.<br> ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    7 KB (958 words) - 16:01, 25 June 2006
  • '''DS 5.6 Security Incident Definition'''<br> ...ent process. Characteristics include a description of what is considered a security incident and its impact level. A limited number of impact levels are define ...
    4 KB (548 words) - 14:21, 4 May 2006
  • What are assets? Asset Management from a corporate governance and information security perspective is not just about 'IT' Assets. It is about the management, cont ...is taken from and attributable to UK-National Health Services Information Security it I believe adequately covers what we can do/do with data. ...
    5 KB (705 words) - 13:29, 23 May 2007
  • ...ology standards and practices based on their business relevance, risks and compliance with external requirements.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (311 words) - 16:29, 1 May 2006
  • ...nsurance carriers. Coverage is increasingly available to cover risks from security breaches or denial of service attacks. Several insurance companies offer e '''When evaluating the need for insurance to cover information security threats, financial institutions should understand the following points:''' ...
    3 KB (469 words) - 13:30, 10 April 2007
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    3 KB (451 words) - 17:52, 5 May 2006
  • =='''Information Security Presentation Samples'''== ...anization can use and tailor these presentation samples to support ongoing security awareness and training efforts.<br> ...
    5 KB (653 words) - 12:45, 25 April 2007
  • ...ment 2: Do not use vendor-supplied defaults for system passwords and other security parameters.''']] * [[PCI 11:|'''Requirement 11: Regularly test security systems and processes.''']] ...
    8 KB (1,208 words) - 17:00, 9 April 2007
  • The objective of this category is to manage information security within the organization's overall administrative structure.<br> ===Management commitment to information security=== ...
    8 KB (996 words) - 12:49, 22 May 2007
  • [[Security Policy:|'''Security Policy''']]<br> [[Organizing Information Security:|'''Organizing Information Security''']]<br> ...
    3 KB (378 words) - 21:27, 18 January 2015
  • ==Personnel Security== ...rs grant legitimate users system access necessary to perform their duties; security personnel enforce access rights in accordance with institution standards. B ...
    10 KB (1,327 words) - 12:54, 10 April 2007
  • ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ::'''2. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...
    3 KB (408 words) - 16:10, 25 June 2006
  • ...ds and guidelines. The policies should address key topics such as quality, security, confidentiality, internal controls and intellectual property. Their releva ...1:|'''SOX.2.7.1''']] End-user computing policies and procedures concerning security, availability and processing integrity exist and are followed.<br> ...
    3 KB (421 words) - 18:02, 23 June 2006
  • ISO 17799 3.1 Information security policy.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    3 KB (377 words) - 14:55, 1 May 2006
  • ISO 17799 4.2 Security of third-party access.<br> ISO 17799 6.1 Security in job definition and resourcing.<br> ...
    2 KB (330 words) - 18:17, 1 May 2006
  • ==Welcome to the Holistic Operational Readiness Security Evaluation (HORSE) project Wiki.== ...ging the growth, development and distribution of free, multilingual, cyber security focused educational content, and to providing the full content of this wiki ...
    9 KB (1,241 words) - 20:49, 13 September 2016
  • ::'''1. Risk: Third party service providers may not meet business, compliance and regulatory needs of the business inducing risk.'''<br> ...al part of development in house. During the planning stages of development security, availability, and processing integrity must be considered. ...
    2 KB (295 words) - 15:33, 25 June 2006
  • ...dividual users, suppliers, security officers, risk managers, the corporate compliance group, outsourcers and offsite management.<br> ISO 17799 4.1 Information security infrastructure.<br> ...
    2 KB (342 words) - 18:20, 1 May 2006
  • ...design ensuring it enables the business strategy and considers regulatory compliance and continuity requirements. This is related/linked to the information arch ...performed and appropriately approved (including account management and IT security). Obtain and examine documents associated with requirements analysis from t ...
    3 KB (446 words) - 16:36, 1 May 2006
  • ...h agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such ::'''(A)''' testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agenc ...
    4 KB (634 words) - 13:00, 4 June 2010
  • ...h agency shall have performed an independent evaluation of the information security program and practices of that agency to determine the effectiveness of such ::'''(A)''' testing of the effectiveness of information security policies, procedures, and practices of a representative subset of the agenc ...
    4 KB (682 words) - 19:17, 3 June 2010
  • ...mation technology - Security techniques - Code of practice for information security management''. The current standard is a revision of the version published i ...ining [[ISMS|Information Security Management Systems]] (ISMS). Information security is defined within the standard in the context of the [[CIA triad|C-I-A tria ...
    6 KB (847 words) - 16:57, 26 March 2007
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting :::'''(i)''' information security standards promulgated by the Director under section 11331 of title 40; and< ...
    10 KB (1,576 words) - 12:50, 4 June 2010
  • == Requirement 12: Maintain a policy that addresses information security. == *A strong security policy sets the security tone for the whole company, and lets employees know what is expected of the ...
    7 KB (988 words) - 19:11, 7 July 2006
  • ::'''(A)''' providing information security protections commensurate with the risk and magnitude of the harm resulting :::'''(i)''' information security standards promulgated under section 11331 of title 40; and<br> ...
    11 KB (1,610 words) - 19:37, 3 June 2010
  • ::'''1. Risk: Security incidents and incompliance with information security procedures may go overlooked and not addressed.''' ...d monitor security incidents and the extent of compliance with information security procedures. ...
    4 KB (601 words) - 15:01, 8 August 2006
View (previous 50 | ) (20 | 50 | 100 | 250 | 500)