22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

88 Lotus Security Handbook<br />

The three phases can be broken down further into ten steps, as illustrated in<br />

Figure 2-18. The details about each step are explained in the remainder of this<br />

chapter.<br />

Assess<br />

Build<br />

Manage<br />

2.5.2 Phase 1: Assess<br />

1. Know the<br />

Business<br />

2. Threat<br />

Analysis<br />

3. Risk<br />

Analysis<br />

4. Categorize<br />

the Data<br />

5. Policies and<br />

Procedures<br />

6. Countermeasures<br />

7. Implement<br />

& Create Docs<br />

8. User<br />

Training<br />

9. Compliance<br />

Testing<br />

10. Results<br />

Feedback<br />

Figure 2-18 The ten steps of the ISSL methodology<br />

What is the Customer's Business?<br />

Who Would Attack, What are the Impacts?<br />

What Exactly Needs to be Secured?<br />

How Sensitive is the Information?<br />

What are the Policies and Procedures?<br />

How can Risks be Controlled or Prevented?<br />

How can this be Implemented and Documented?<br />

Do Users Know How to be Secure?<br />

Is Everything in Place Compliant?<br />

How are Things? Can They Be Improved?<br />

The first phase is where all the planning takes place. The activities in this phase<br />

involve both the evaluation of the current state of affairs and the planning of the<br />

security infrastructure to be put in place. Following is a detailed breakdown of the<br />

security-related activities that need to be performed during the assessment<br />

phase.<br />

1. Understand the business of the client<br />

In this activity, we ensure that a solid understanding of the business of the client<br />

organization is developed. To determine the proper security mechanisms to put<br />

in place, you first must understand some basic things about the organization,<br />

such as the core business, the stakeholders, the demographics of the business,<br />

the vendors, the business partners (if any), the competition and the industry

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!