Big Data - Work Program - 02 - Data Security Management (10 24 2013)
Big Data - Work Program - 02 - Data Security Management (10 24 2013)
Scope
Date
Client Name
Protiviti Team:
(Insert Team Member Name)
(Insert Team Member Name)
Big Data Work Program – Data Security Management
Process Overview
Data Security Management consists of the planning, development, and execution of security policies and procedures to provide
proper authentication, authorization, access, and auditing of data and information assets. Effective data security policies and
procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is
restricted. Understanding and complying with the privacy and confidentiality interests and needs of all stakeholders is in the best
interest of any organization. Client, supplier, and constituent relationships all trust in, and depend on, the responsible use of data.
Time invested in better understanding stakeholder interests and concerns generally proves to be a wise investment. An effective
data security management function establishes judicious governance mechanisms that are easy enough to abide by on a daily
operational basis by all stakeholders.
Table of Contents
1. Understand Data Security Needs and Regulatory Requirements..........................................................................2
2. Define Data Security Policy....................................................................................................................................... 2
3. Define Data Security Standards................................................................................................................................ 3
4. Define Data Security Controls and Procedures....................................................................................................... 4
5. Manage Users, Passwords, and Group Membership.............................................................................................. 5
6. Manage Data Access Views and Permissions......................................................................................................... 6
7. Monitor User Authentication and Access Behavior................................................................................................ 8
8. Classify Information Confidentiality..........................................................................................................................9
9. Audit Data Security................................................................................................................................................... 10