18.01.2013 Views

Enabling Processes

Enabling Processes

Enabling Processes

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Deliver, Service and Support<br />

DSS05 RACI Chart<br />

Key Management PracticeBoard DSS05.01<br />

Protect against malware.<br />

DSS05.02<br />

Manage network and<br />

connectivity security.<br />

DSS05.03<br />

Manage endpoint security.<br />

DSS05.04<br />

Manage user identity and<br />

logical access.<br />

DSS05.05<br />

Manage physical access<br />

to IT assets.<br />

DSS05.06<br />

Manage sensitive documents<br />

and output devices.<br />

DSS05.07<br />

Monitor the infrastructure for<br />

security-related events.<br />

192<br />

: ENABLING PROCESSES<br />

Chief Executive Officer<br />

Chief Financial Officer<br />

Chief Operating Officer<br />

Business Executives<br />

Business Process Owners<br />

Strategy Executive Committee<br />

�������� ��������������������� ���������<br />

������� ���������� ������<br />

����� ���������� ������<br />

Chief Risk Officer<br />

Chief Information Security Officer<br />

Architecture Board<br />

Enterprise Risk Committee<br />

Head Human Resources<br />

Compliance<br />

Audit<br />

Chief Information Officer<br />

R I C A R C C C I R R I R<br />

I C A C C C I R R I R<br />

I C A C C C I R R I R<br />

R C A I C C C I C R I R C<br />

I C A C C C I C R I R I<br />

Head Architect<br />

Head Development<br />

Head IT Operations<br />

I C C A R<br />

I C I A C C C I C R I R I I<br />

DSS05 Process Practices, Inputs/Outputs and Activities<br />

Management Practice Inputs Outputs<br />

DSS05.01 Protect against malware.<br />

From Description Description To<br />

Implement and maintain preventive, detective and<br />

corrective measures in place (especially up-to-date<br />

security patches and virus control) across the enterprise<br />

Malicious software<br />

prevention policy<br />

APO01.04<br />

to protect information systems and technology from<br />

Evaluations of<br />

APO12.02<br />

malware (e.g., viruses, worms, spyware, spam).<br />

Activities<br />

potential threats<br />

APO12.03<br />

1. Communicate malicious software awareness and enforce prevention procedures and responsibilities.<br />

2. Install and activate malicious software protection tools on all processing facilities, with malicious software definition files that are updated as required<br />

(automatically or semi-automatically).<br />

3. Distribute all protection software centrally (version and patch-level) using centralised configuration and change management.<br />

�� ��������� ������ ��� �������� ����������� �� ��� ��������� ������� ������ ��������� �������� �������� ��� �������� �������� ������������<br />

5. Filter incoming traffic, such as email and downloads, to protect against unsolicited information (e.g., spyware, phishing emails).<br />

6. Conduct periodic training about malware in email and Internet usage. Train users to not install shared or unapproved software.<br />

Personal Copy of: Mr. Dong Hong Wang<br />

Head IT Administration<br />

Service Manager<br />

Information Security Manager<br />

Business Continuity Manager<br />

Privacy Officer

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!