ITSM Best Practices
ITSM Best Practices
org
Standards
Meta Security
Open Source Standards
SSO, Federated Identity Identity and Access
Management (IAM) ISO 20000 / ISO 27001(2005) / ISF / CobiT-COSO / ITIL / MOF - Best Practices
Password Management and Security Administrative CMMI / PMBOK / NIST / ITPI / Six Sigma (Lean) - DMADDI
Security
Prevention / Assessment / Detection Threat Management Critical Infrastructure Protection Planning
Design (see Portfolio - Program -Application - Code Lifecycle Management
Firewalls / Telecom (VOIP) / SOA Meta Security)
Infrastructure / Information Architecture (PO 2)
Wireless Security / Access Points (NAC) / Mobile Media & Devices (Integrated and Layered
Defense / Countermeasures Topology / PLM / Security Requirements Analysis and Specification
Intrusion Detection and Prevention Systems (IDS/IPS) Technical & Semantic SOA
-- see details below)
Logical Security Platforms Standards / High Availability / Virtualization / Synergies
Audit & Log -- Systems & Processes Security Information/Event
Real-Time Assessment (Sniffers) Management (SIEM) Standards / Licensing / Audits / Migration / Management (AI 6 & 7)
Software (AI 2)
Vulnerability Assessment (Scanners)
U.S. Compliance -- SOX-COSO / ARRA-HITECH-HIPAA / SAS 70 / GLBA / FCPA / FIPS PUB-200 (Gov.)
Access Controls Physical &
Environmental Security International Compliance -- DPA, IP, HAS - UK / PIPEDA - Can / BIS / 8thDirCons / Basel II
Personnel Security
Management
Physical Access Controls Corporate Compliance, Legal Stake holders / Shareholders / Employees
and Regulatory Management Remediation / Reports
Asset security, encryption & management Physical Internal Investigation, Audit, Quality Control
Unauthorized hosts & sniffers, taps, unmanaged network ports
Risk Management (PO 9) Fraud / Reputation / Assets / Value
Topology Planning / Methodology /
Standards / Service Standards (see root topic)
Firewall / VPN (See layered defense Design, Modeling &
Rules & Access Control Lists (ACLs) Research / Process Topology (see root topic)
& Network Architecture), IDS / IPS,
Process, Technology and Operations
XML networks / gateways Content filters, NAC , SSO Evaluations / Assurance / Control Processes & Practices (Change, Access, ...)
Security Controls Management: Service Strategy, Scope,
SAML / SOAP / WS-Security & Devices Controls & Metrics (PO 3) Ontology, Taxonomy, Definitions,
Service Management
Switches, Routers & Access / data ports / protocol controls Measures, Models [ BPM ] (AI 4) (DS 13)
Test and Development environments IT Security Management Mission & Function Protection
CXO Summaries
Password and two-factor management
Reporting Network and Services status
Privileged Access & Rights / Temporary & Emergency Accounts Management Reports
Incident reports
Service & Support Accounts
Remediation Management - Delivery & Compliance
Identification, Authentication, Authorization (RBAC / xBAC)
Architecture, Network, Systems, Application and Information
SSO, Federated IAM life-cycle planning, development and support / SDLC Feedback mechanisms & reporting
Transport Controls / RFID
Security Controls Culture of Security
Passive/Active ID Cards / Badges, Tokens, Biometrics
IT Security Awareness Learning & Innovation
Hardening Standards Configuration Control Roles and
Responsibilities Guidance Documentation
Audit Logs / Forensics Network-Server-Workstation
& mobile device Management Transfer of skills and learning
Asset Management / Refresh Training / certifications
Privileged Access / Segmentation Staff Training and Background Assessment, Drug Testing
Management /
Testing / Validation / Verification / Certification & back-out Quality Leadership Separation of Duties
Accountability
Installations, Distributions and rollout management Release Control Productivity metrics
Performance Measurement
Security & Compatibility Testing, Evaluation & Reporting Competence Assessment
Patches, Hotfixes, Updates Security / Hardening Standards Access controls / badges / keys / time clock
System Software (Asset) Workforce Access controls &
Management (Release) Change Control Service Provisioning / Logical Separation of duties / RBAC
Licensing Management & Controls
Delivery (Network) (AI )
Human Resources (HR) collaboration
Lifecycle Management & Version control & auditing
Patches, Hotfixes, Updates Threats -- Unified Threat Management ( UTM) / Integrated IT Security Strategy
Security / Hardening Standards Meta Security --
Application log monitoring Risk and Threat Security Impact and Privacy Analysis National and Global IT Security engagement
Database Management Application Management & Assessment and
Controls (Release) (AC) Management Vulnerability assessments, audits, testing, review / Penetration testing
Licensing Management & Controls
Remediation Planning - Management - Projects
Application - Code Lifecycle Management
Proactive Model and Process Assessment
& Version control & auditing
-- Anticipation (Risk/Operational)
Information Backup and Restoration / DLP / Archiving and Destruction / MDM / Indexing Planning & Processes
IT Security Architecture / Design / Posture (see Network & Security Architecture)
Asset Tagged-Audits-logging-reports / Refresh Plan and Disposal
Network, Operational & Physical Security Management
Media Control / Movement & Rotation / Storage / Disposal Asset and Resource Protection & Management (Operational)
Policies & Procedures Standards
Virtualization / Services / Servers / Workstations / Mobile Devices
CobIT Model: high level Icon tagged Red text indicates Workforce Behavior / Appropriate Use / Fraud
Underlined text
in green: low level in text indicates ISO 20000 Monitoring / Auditing / Investigations (see Security Incident management)
indicates ISO Evaluation (Operational)
(parans) ITIL Domains Domains 27002 Domains Audit Logs & Log Management / Network traffic monitoring
Alerts & Alarms / Reporting and Trending