11.07.2015 Views

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

Cyber Security Capability Framework & Mapping of ISM Roles - agimo

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

SERVICE DELIVERY The authorisation and monitoring <strong>of</strong> access to IT facilities or infrastructure in accordance withestablished organisational policy. Includes investigation <strong>of</strong> unauthorised access, compliance with relevant legislation and theperformance <strong>of</strong> other administrative duties relating to security management.EL 1 EL 2Supports System <strong>Security</strong>1. Reviews information systems for actual or potential breaches in security andensures that all identified breaches in security are promptly and thoroughlyinvestigated.2. Ensures that security records are accurate and complete includingcertification documentation.Delivers Service Excellence1. Develops and manages customer service performance requirements forinformation securityLeads and Develops People1. Provides on the job training and coaching for team members.Supports Shared Purpose and Direction1. Drafts and maintains the policy, standards, procedures and documentationfor security.2. Interprets security policy and contributes to development <strong>of</strong> standards andguidelines that comply with this.3. Monitors contract performance and reviews deliverables and contractrequirements related to organisational information technology security andprivacy.Supports System <strong>Security</strong>1. Reviews reports on, or analyses information on, security incidents andpatterns to determine remedial actions to correct vulnerabilities.Delivers Service Excellence1. Develops and manages customer service performance requirements forinformation security.2. Ensures information ownership responsibilities are established for eachinformation system and implements a role based access scheme.Leads and Develops People1. Performs project management duties where appropriate.2. Directs the implementation <strong>of</strong> appropriate operational structures andprocesses to ensure an effective information security program.3. Oversees an information security section.4. Acts as a mentor.Supports Shared Purpose and Direction1. Develops strategies for ensuring the security <strong>of</strong> automated systems.2. Develops ICT <strong>Security</strong> direction and policy.3. Ensures that the policy and standards for security are fit for purpose, currentand are correctly implemented.4. Reviews new business proposals and provides specialist advice on securityissues and implications.5. Advises the appropriate stakeholders <strong>of</strong> changes affecting the organisation’sinformation technology security postureProduced for AGIMO by Workplace Research Associates Pty Ltd 2010 Page 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!