Summarised - 2010
Summarised - 2010
Summarised - 2010
Risk
Authorisation
Management
Administration Audit
Availability
1. Business Rules
5. Data
Classification 2. Security Policy
Policy
Artefacts
3.
4. Risk Analysis Data/Information
Ownership
Security Security
Policy Standard
2 3
1
A new IT
architecture
A new threat initiative
A new statutory realized or discovers new
or regulatory experienced stakeholders
mandate and/or new
requirements
A written Security Policy for the organisation must be in
place
Objective
Applicable
Jurisdictions
Input
2 3 4
1
Security
Applicable Security Team Assumptions
Applicable Security Policies Roster and Boundary
Regulations Conditions
Output
Obtain management support for security measures
Management
Support
Applicable
Jurisdictions
INPUT
Output
2 3 4
1
Business
Physical Regulatory Security Policy
Security
Security Environment Cover Letter
Environment
Environment Statement Signed
Statement
Statement
6 7
5
List of Disaster
Architecture Recovery and System Critical
Development Business Statement
Checkpoints for Continuity Plans
Sign-off
Determine who are the legitimate actors who will
Legitimate
Actors
interact with the product/ser vice/process
Asset
Identify and document the ownership of assets
Ownership
applicable security
policies and regulations
Input
Output
2 3 4
1
6 7 8
5
Baseline
Interconnecting
Target security security security actors
Systems
processes processes
9 10 11 12
List of trust
security
Asset list with paths and
tolerance for Threat analysis
values and Availability
each class of matrix
owners impact
security actor
statement(s)
Assess and baseline current security-specific architecture elements (enhancement of existing
objective)
Baseline Architecture
Elements
DR and BCM
Interconnecting
Requirements Systems
Security Input
Security Output
2 3 4
1
List of
Risk
Event log-level Data Life Cycle configurable
Management
matrix and Definitions system
Strategy
requirements elements
6 7 8
5
Security use-
New or
case models,
Baseline list of augmented Validated
List of
security-related security-related interconnected
applicable
elements of the elements of the system list
security
system system
standards
9 10 11 12
Information
Revised disaster
classification Function
recovery and Refined threat
report, List of criticality
business analysis matrix
asset statement
continuity plans
custodians
Assess and baseline current security-specific technologies (enhancement of existing objective)
Revisit assumptions regarding interconnecting systems beyond project control
Baseline Identify and evaluate applicable recognized guidelines and standards
Technologies
Identify minimal privileges required for any entity to achieve a technical or business objective
Privileges
Validated Security
Policies, Regulatory and
Trust Requirements
Security Input
Security Output
2 3 4
1
6 7 8
5
Evaluate tested and re-usable security software and security system resources
Evaluate