11.07.2015 Views

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Information <strong>Security</strong>Analyses and Evaluates1. Conducts security risk assessments for business applications and computerinstallations; provides authoritative advice and guidance on security strategies tomanage the identified risk.2. Investigates major breaches <strong>of</strong> security, and recommends appropriate controlimprovements.3. Writes and publishes reports on incident outcomes and distributes to appropriatestakeholders.4. Analyses information security incidents and patterns to determine remedial actionsto correct vulnerabilities.5. Monitors and evaluates the effectiveness <strong>of</strong> the organisation’s information securityprocedures and safeguards for the infrastructure.6. Develops and implements the necessary security plans and proceduraldocumentation, including disaster recovery plans, to ensure that informationsecurity incidents are avoided during shutdown and long term protection <strong>of</strong>archived resources is achieved.7. Reports unresolved network security exposures, misuse <strong>of</strong> resources or noncompliancesituations to an ITSM.Technology Audit1. Evaluates functional operation and performance in light <strong>of</strong> test results and makesrecommendations regarding certification or accreditation.2. Examines vulnerabilities and determines actions to mitigate them. Develops andapplies effective vulnerability countermeasures.3. Analyses information security vulnerability bulletins for their potential impact on thecomputing or network environment, and takes or recommends appropriate action.Emerging Technology Monitoring1. Monitors the market to gain knowledge and understanding <strong>of</strong> currently emergingtechnologies.2. Identifies new and emerging hardware and s<strong>of</strong>tware technologies and productsbased on own area <strong>of</strong> expertise, assesses their relevance and potential value to theorganisation, contributes to briefings <strong>of</strong> staff and management.Applies Technical Pr<strong>of</strong>iciency1. Ensures that any system changes required to maintain security are implemented.2. Recommends and schedules information security related repairs, upgrades or projecttasks within the organisation’s environment.3. Writes and maintains scripts required to ensure security <strong>of</strong> the infrastructure’s environment.4. Plans and schedules the installation <strong>of</strong> new or modified hardware, operating systems, ands<strong>of</strong>tware applications ensuring integration with information security requirements for theinfrastructure.5. Schedules and performs regular and special backups on all infrastructure systems.4. Performs risk assessment, business impact analysis and accreditation for all major informationsystems within the organisation.5. Interprets patterns <strong>of</strong> non-compliance to determine their impact on levels <strong>of</strong> risk and/or overalleffectiveness <strong>of</strong> the organisation’s information technology security program.6. Oversees the development <strong>of</strong> organisational logging standards to comply with auditrequirements.7. Manages and audits system event logs.3. Formulates or provides input to the organisation’s information security budget.4. Develops network security requirements specific to an acquisition for inclusion inprocurement documentsProduced for AGIMO by Workplace Research Associates Pty Ltd 2010 Page 20

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!