Preview

Cobit Security Checklist

Powerful Essays
Open Document
Open Document
7749 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cobit Security Checklist
Security Checklist for the XYZ Company

1. PO1.3 Assessment of Current Capability and Performance

2. PO2.3 Data Classification Scheme

3. AI6.1 Change Standards and Procedures

4. DS4.1 IT Continuity Framework

5. DS5.2 IT Security Plan

6. DS5.3 Identity Management

7. DS5.5 Security Testing, Surveillance and Monitoring

8. DS5.9 Malicious Software Prevention, Detection, and Correction

9. DS5.10 Network Security

10. ME1.3 Monitoring Method

Supporting Explanation for Check-list Item Number 1

The first step in a security checklist for XYZ Company is COBIT PO1.3, an assessment of the current capability and performance of solution and service delivery. The assessment should measure IT's contribution to business objectives, functionality, stability, complexity, costs, strengths, and weaknesses. While this assessment will be useful for security purposes, all areas of IT can use it because security capabilities are a subset of overall IT capabilities. It will provide a baseline to which to compare future changes. Since XYZ is not a new company, they must have existing infrastructure and services in place. Thus, having a baseline is advantageous because it will allow IT to show tangible improvements to executives, which will help procure financing for future IT endeavors.

Assessing current capabilities will also prevent them from building solutions from scratch when a similar one already exists. By reducing re-work, XYZ can use their funds to the utmost effect. Another side effect of the assessment will be groundwork for the identification of the company's information assets, which will be important in future steps such as data classification. According to COBIT, the assessment should also measure IT's strengths and weaknesses. Some of the weaknesses will undoubtedly be security related and give XYZ Company areas on which to focus improvements.

To accomplish the assessment, IT will have to interview people across the enterprise. In

You May Also Find These Documents Helpful

  • Better Essays

    In order to determine a company’s performance, analysis must be done for key metrics, including the ability to pay debts, how much cash or other liquid assets are available, and the company’s viability to continue operations. These analyses involve the review of income statements and balance sheets, where current and past performance will be studied with the goal of predicting how the company will perform in the future. Upper-level management at CBI can use this information to make decisions in line with the company’s goals.…

    • 7844 Words
    • 32 Pages
    Better Essays
  • Powerful Essays

    their defensive controls at the perimeter in the belief that this makes it difficult for…

    • 5023 Words
    • 21 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    As we progress forward, a few specific requirements such as software and data, information and hardware must be obtained in order to identify the type of system needed. The collected information is vital when determining the type of classifications and what is needed to insure the items or information is being secured. When it comes to threat identification, are level of threats is categorize…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Assignment #3

    • 1880 Words
    • 8 Pages

    Mission Enterprise Company has developed a project checklist for the Security IT Mission that outlines the project with various levels of detail. As a subcontractor to Vital Operations on this project, Mission Enterprise Company is no longer able to control many of the aspects of staffing personnel for a project such as security, selecting qualified personnel, and determining salaries of personnel. The main function of the project has been identified as well as primary stakeholders. This project will also assess the current and future situations that will be most impacted by this project. Security IT Mission will set a precedent for Mission Enterprise Company because it is a transition of a current task order with the new award to a small business, Vital Operations. By defining assumptions with the project there will be a chance to formulate ideas to overcome hurdles associated with this and future projects similar to Security IT Mission.…

    • 1880 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    In order to evaluate company’s operational strength and weaknesses accurately it is important to have access to more than one year worth of data. The company, of course, will not be evaluated on the basis of couple of ratios, it is very important to analyze all the available information to put pieces of puzzle together to see the overall impression of the company and its attractiveness to creditors, investors and stockholders.…

    • 8425 Words
    • 34 Pages
    Powerful Essays
  • Better Essays

    The review results were positive with a suggestion for an improvement. The team found that RedSeal product provides the intelligence necessary to improve defenses, maintain continuous compliance and mitigate real-world risks by identifying the available paths of access and exposed vulnerabilities present across a network (Stephenson, 2012). The RedSeal solution is either a hardware appliance or software product and is architected for a fast and efficient means of implementing the system (Stephenson, 2012). The design will provide the most secure, scalable, and dependable deployment possible (Stephenson, 2012). Continuous monitoring focuses on correlating IT, network, and vulnerability feeds (Stephenson, 2012). The system identifies risk associated with the business’s security effectiveness as opposed to policy and compliance driven tools (Stephenson, 2012). RedSeal provides a large library of supported vendor products, allowing security and vulnerability data to be quickly and easily imported into the system. The system automatically builds network maps and correlates the map data with configuration and vulnerability data, which creates a threat reference library. RedSeal finds and eliminates gaps in businesses security controls and prioritizes the impact of those gaps. RedSeal is not an assessment or audit tool, but it does correlate risk to various controls for compliance regulations, creating reports that show gaps in deployed configurations/controls (Stephenson, 2012). The team would have liked to have seen more integration with governance, risk, and compliance solutions (Stephenson, 2012). The product only provided a piece of the risk picture. The piece is important, and one that a number of assessment and audit driven tools do not deliver and could leverage (Stephenson,…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    assess the potential strengths and weakness and the possible opportunities and threats that may be…

    • 845 Words
    • 4 Pages
    Good Essays
  • Good Essays

    In reviewing the current business process, geographic layout, current IT architecture and network infrastructure there were some security issues that could and should be improved upon. Currently the existing security policy is not sufficient for the needs of the company. It is being evaluated every two years and there appears to be no encryption software use to prevent the possibility of data being mishandled, lost or stolen. A security “policy begins with assessing the risk to the network and building a team to respond. Continuation of the policy requires implementing a security change management practice and…

    • 679 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This Learning Team Project requires students to develop a semi-quantitative, weighted analysis that generates a comprehensive threat/vulnerability analysis of enterprise security, along with appropriate security measures and recommendations. Additionally, the readings provide background information supporting various techniques, as well as how to do assessments, how to create rankings, and so forth. These readings should be previewed as early as possible, rather than waiting for the specific week. The Enterprise Security Plan is due in Week…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 340 Words
    • 2 Pages

    One the first steps in implementing an effective security plan is to periodically assess Organizational risks. Identifying and mitigating risk will help in establishing a security management structure and assigning security responsibilities. Without having an understanding of your risk you are unable to determine the proper security policies, procedures, guidelines, and standards to put in place to ensure adequate security controls are implemented. The risk assessment provides a baseline for implementing security plans to protect assets against threats. Within the risk assessment some basic questions must be answered, What assets within the organization need protection, What are the risks to each of these assets, How much time, effort, and money is the organization willing to spend to upgrade or obtain new adequate protection against these threats?…

    • 340 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Rio Tinto Industry Analysis

    • 2817 Words
    • 12 Pages

    This report will analyze the importance of both the general and industry assessment and the impact environment will have on the company, strategies that are set to achieve the organization goals and also Porter's 5 forces theory for the industry assessment. The report will be focusing on a mix of both QIT - Fer et Titane and also…

    • 2817 Words
    • 12 Pages
    Powerful Essays
  • Better Essays

    For any business, the need to protect its assets is just as important as the need to maintain or increase its bottom line. If a business does not, will not, or can not enact a sufficient security plan that is the equal to or greater than its needs, it may find itself rapidly losing its assets, its monies, or completely out of business. In addition to a robust security policy, there must also be robust standards put into place to clearly define the roles the employees, as well as the management, must play in order to properly enact those roles.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Security Monitoring

    • 867 Words
    • 4 Pages

    For an organization to truly have an secure system they must determine an list of risk. Businesses and organizations can use security monitoring to ensure both integrity and confidentiality for sensitive information. As well as holding IT administrators responsible for keeping their organizations sensitive and financial assets safe and secure from unwanted eyes.…

    • 867 Words
    • 4 Pages
    Satisfactory Essays