22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

trends and standards in which the organization operates. This will establish a<br />

solid foundation upon which to do the rest of the security work.<br />

The overall security review process can be divided into the following distinct<br />

steps:<br />

1. Review the current state of the business<br />

a. Identify the core business<br />

b. Identify the stakeholders<br />

c. Compile the demographics of the business<br />

d. Identify the vendors<br />

e. Identify any business partners<br />

f. Identify the competition<br />

g. Identify the industry trends and standards<br />

2. Perform an initial infrastructure review<br />

a. Review the infrastructure from a hardware point of view<br />

b. Review the infrastructure from a software point of view<br />

3. Perform an initial risk analysis (a more detailed one follows in a later step)<br />

4. Review the security policy if there is one<br />

a. Policy goals and objectives<br />

b. Scope<br />

c. Responsibilities<br />

d. Physical security<br />

e. Network security<br />

f. Data classification<br />

g. Access control<br />

h. Password policies and procedures<br />

i. Incident handling procedures<br />

j. Acceptable use policies<br />

k. Change control<br />

l. Training<br />

m. Compliance<br />

Once this is done and reviewed, you can move on to the next steps outlined by<br />

this sample methodology. The IT people working for the organization whose<br />

Chapter 2. Security methodologies 89

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!