|
|
Determining Your Organization's Risk Management Maturity Level
Before an organization attempts to implement the Microsoft security risk
management process, it is important that it examines its level of maturity with
regard to security risk management. An organization that has no formal policies
or processes relating to security risk management will find it extremely
difficult to put all aspects of the process into practice at once. Even
organizations with some formal policies and guidelines that most employees
follow fairly well may find the process a bit overwhelming. For these reasons,
it is important that you make an estimate of your own organization's maturity
level. If you find that your organization is still relatively immature, than you
may want to introduce the process in incremental stages over several months,
perhaps by piloting it in a single business unit until the cycle has been
completed several times. Having demonstrated the effectiveness of the Microsoft
security risk management process through this pilot program, the Security Risk
Management Team could then slowly introduce it to other business units until the
entire organization is using it.
How do you determine the maturity level of your organization? As part of
Control Objectives for Information and Related Technology (CobiT), the IT
Governance Institute (ITGI) includes an IT Governance Maturity Model. You may
want to acquire and review CobiT for a detailed method for determining your
organization's level of maturity. The Microsoft security risk management process
summarizes elements used in CobiT and presents a simplified approach based on
models also developed by Microsoft Services. The maturity level definitions
presented here are based on the International Standards Organization (ISO)
Information technology — Code of practice for information security
management, also known as ISO 17799.
You can estimate your organization's level of maturity by comparing it to the
definitions presented in the following table.
Table 3.2 Security Risk Management Maturity Levels
Level |
State |
Definition |
0 |
Non-Existent |
Policy (or process) is not documented, and
previously the organization was unaware of the business risk
associated with this risk management. Therefore, there has been no
communication on the issue. |
1 |
Ad-Hoc |
It is clear that some members of the organization
have concluded that risk management has value. However, risk
management efforts are performed in an ad-hoc manner. There are no
documented processes or policies and the process is not fully
repeatable. Overall, risk management projects seem chaotic and
uncoordinated, and results are not measured and audited. |
2 |
Repeatable |
There is awareness of risk management throughout the
organization. The risk management process is repeatable yet
immature. The process is not fully documented; however, the
activities occur on a regular basis, and the organization is working
toward establishing a comprehensive risk management process with
senior management involvement. There is no formal training or
communication on risk management; responsibility for implementation
is left to individual employees. |
3 |
Defined Process |
The organization has made a formal decision to adopt
risk management wholeheartedly in order to drive its information
security program. A baseline process has been developed in which
there are clearly defined goals with documented processes for
achieving and measuring success. Additionally, some rudimentary risk
management training is available for all staff. Finally, the
organization is actively implementing its documented risk management
processes. |
4 |
Managed |
There is a thorough understanding of risk management
at all levels of the organization. Risk management procedures exist,
the process is well defined, awareness is broadly communicated,
rigorous training is available, and some initial forms of
measurement are in place to determine effectiveness. Sufficient
resources have been committed to the risk management program, many
parts of the organization are enjoying its benefits, and the
Security Risk Management Team is able to continuously improve its
processes and tools. There is some use of technological tools to
help with risk management, but many if not most risk assessment,
control identification, and cost-benefit analysis procedures are
manual. |
5 |
Optimized |
The organization has committed significant resources
to security risk management, and staff members are looking toward
the future trying to ascertain what the issues and solutions will be
in the months and years ahead. The risk management process is well
understood and significantly automated through the use of tools
(either developed in-house or acquired from independent software
vendors). The root cause of all security issues is identified, and
suitable actions are taken to minimize the risk of repetition.
Training across a range of levels of expertise is available to
staff. |
Organizational Risk Management Maturity Level Self Assessment
The following list of questions offers a more rigorous way to measure your
organizational maturity level. The questions elicit subjective answers, but by
honestly considering each of them you should be able to determine how well
prepared your organization is for implementation of the Microsoft security risk
management process. Score your organization on a scale of 0 to 5, using the
previous maturity level definitions as a guide.
- Information security policies and procedures are clear, concise,
well-documented, and complete.
- All staff positions with job responsibilities involving information
security have clearly articulated and well understood roles and
responsibilities.
- Policies and procedures for securing third-party access to business data
are well-documented. For example, remote vendors performing application
development for an internal business tool have sufficient access to network
resources to effectively collaborate and complete their work, but they have
only the minimum amount of access that they need.
- An inventory of Information Technology (IT) assets such as hardware,
software, and data repositories is accurate and up-to-date.
- Suitable controls are in place to protect business data from
unauthorized access by both outsiders and insiders.
- Effective user awareness programs such as training and newsletters
regarding information security policies and practices are in place.
- Physical access to the computer network and other information technology
assets is restricted through the use of effective controls.
- New computer systems are provisioned following organizational security
standards in a standardized manner using automated tools such as disk
imaging or build scripts.
- An effective patch management system is able to automatically deliver
software updates from most vendors to the vast majority of the computer
systems in the organization.
- An incident response team has been created and has developed and
documented effective processes for dealing with and tracking security
incidents. All incidents are investigated until the root cause is identified
and any problems are resolved.
- The organization has a comprehensive anti-virus program including
multiple layers of defense, user awareness training, and effective processes
for responding to virus outbreaks.
- User provisioning processes are well documented and at least partially
automated so that new employees, vendors, and partners can be granted an
appropriate level of access to the organization's information systems in a
timely manner. These processes should also support the timely disabling and
deletion of user accounts that are no longer needed.
- Computer and network access is controlled through user authentication
and authorization, restrictive access control lists on data, and proactive
monitoring for policy violations.
- Application developers are provided with education and possess a clear
awareness of 15.
- Business continuity and business continuity programs are clearly
defined, well documented, and periodically tested through simulations and
drills.
- Programs have commenced and are effective for ensuring that all staff
perform their work tasks in a manner compliant with legal requirements.
- Third-party review and audits are used regularly to verify compliance
with standard practices for security business assets.
Calculate your organization's score by adding the scores of all of the
previous items. Theoretically, scores could range from 0 to 85; however, few
organizations will approach either extreme.
A score of 51 or above suggests that the organization is well prepared to
introduce and use the Microsoft security risk management process to its fullest
extent. A score of 34 to 50 indicates that the organization has taken many
significant steps to control security risks and is ready to gradually introduce
the process. Organizations in this range should consider rolling out the process
to a few business units over a few months before exposing the entire
organization to the process. Organizations scoring below 34 should consider
starting very slowly with the Microsoft security risk management process by
creating the core Security Risk Management Team and applying the process to a
single business unit for the first few months. After such organizations
demonstrate the value of the process by using it to successfully reduce risks
for that business unit, they should expand it to two or three additional
business units as feasible. Continue to move slowly, though, because the changes
introduced by the process can be significant. You do not want to disrupt the
organization to such a degree that you interfere with its ability to effectively
achieve its mission. Use your best judgment in this regard — every system that
you leave unprotected is a potential security and liability risk, and your own
knowledge of your own systems is best. If you think that it is urgent to move
quickly and to disregard the suggestion to move slowly, do that.
You should carefully consider which business unit to use for the pilot
programs. Questions to consider relate to how important security is to that
business unit, where security is defined in terms of the availability,
integrity, and confidentiality of information and services. Examples include:
- Is the security risk management maturity level of that business unit
above average when compared to the organization?
- Will the owner of the business unit actively support the program?
- Does the business unit have a high level of visibility within the
organization?
- Will the value of the Microsoft security risk management process pilot
program be effectively communicated to the rest of the organization if
successful?
You should consider these same questions when selecting business units for
expansion of the program.
|
Call Now : 800-519-
2267
Testimonials
|
If you're serious about getting certified,
this is the place to go. Definitely worth
their competitive price. Excellent
instructors, making it possible for anyone
to learn no matter what your level of
experience or knowledge.
Michael Doty
|
|
|
|
|
|
MCITP Boot Camp
,
MCSE Boot camp,
CCNA Boot Camp,
Upgrade to MCITP Boot
camp,
MCITP Enterprise admin
Certification
Boot camp Training.
All
rights reserved. ©1998 - 2015, Vibrant Worldwide Inc.
MCITP Boot camp
UK
MCITP Camp
Thailand
MCITP
RHCE Boot Camp India
MCSE Boot Camp - Proven Boot camp for MCSE at Baltimore, Maryland
MCITP, MCSE, CCNA, Certification n training guide, how mcse mcitp
ccna boot camp works
MCSE Boot Camp Proven MCSE Boot camp Training for MCSE
Certification Fast
MCSE Boot Camp Card Payment by Paypal
CCNA 801 Boot Camp by Vibrant boot camps, join MCSE camps
CCNA Boot Camp by Vibrant boot camps, join MCSE camps
CCNP Boot Camp by Vibrant boot camps, join CCNP camps
MCSE MCITP CCNA Boot Camp Card Payment by Paypal
MCSE MCITP Boot Camp location
comaprision between USA, UK, India and Thailand
MCSE Boot Camp compare Vibrant boot camps with other boot camp
provider
Comptia Security+ Boot Camp by Vibrant boot camps, join MCSE
camps
MCSE Boot Camp contact Vibrant boot camps
MCSE Boot Camp course fees Vibrant boot camps, join MCSE camps
MCSE Boot Camp FAQ by Vibrant boot camps, join MCSE camps
MCSE Boot Camp provide your Feedback here
MCSE CCNA CCNP Boot Camp inquire we call back
MCSE Boot Camp location San Francisco and Baltimore
MCITP Boot Camp MCITP 14days
all_incl MCITP Certifiation boot camp
MCITP Boot Camp MCITP Benefits
MCITP Certifiation boot camp
MCITP Boot Camp MCITP curriculum
MCITP Certifiation boot camp
MCITP Boot Camp MCITP bootcamp
details MCITP Certifiation camp
MCITP Boot Camp MCITP exam detail
MCITP Certifiation boot camp
MCSE Boot Camp MCSE Certification Camp also MCSE Training Boot
Camp
MCSE Benefits join MCSE Boot Camp by Vibrant boot camps
MCSE Curriculum join MCSE Boot Camp
MCSE Exam Detials join MCSE Boot Camp
MCSE boot camp details, join MCSE camps
MCSE MCITP Boot Camp MCSE MCITP 18days 8 Certifiation boot camp
MCSE MCITP combo Boot Camp MCITP
MCSE Benefits MCITP Certifiation boot camp
MCITP MCSE Boot Camp MCITP
curriculum MCITP Certifiation boot camp
MCSE MCITP Boot Camp MCITP MCSE
bootcamp details MCITP Certifiation camp
MCSE MCITP Boot Camp MCITP MCSE
exam detail MCITP Certifiation boot camp
MCSE MCITP CCNA Boot Camp MCSE
MCITP CCNA 23days 9 Certifiation boot camp
MCSE Security Boot Camp MCSE
14days all_incl MCSE Certifiation boot camp
MCSE Security certification benefits join boot camp now
MCSE Security Boot Camp Curriculum join MCSE camps
MCSE Security Exam Detail join MCSE boot camps
MCSE Security Boot Camp Details for MCSE Certification
MCSE Boot Camp Payment Gateway to get MCSE Certification Fast!
MCITP Boot Camp, CCNA Boot Camp
reason to join Vibrant boot camp
MCSE Boot Camp Refunds
MCSE CCNA CCNP Boot Camp Register. Join MCSE CCNA Boot Camp today
MCSE CCNA CCNP thailand bangkok Boot Camp Register. Join Thailand
MCSE CCNA Boot Camp today
MCSE Schedule CCNA Scedule CCNP Boot Camp Schedule
MCITP Boot Camp, MCSE Boot camp, CCNA Boot Camp, Special offer
Vibrant boot camp
MCSE Boot Camp Testimonials by Vibrant boot camps
MCSE Boot Camp location San Francisco and Baltimore
Virbant Boot Camp thank You Trasaction successfull
MCSE Boot Camp upgrade win2008 mcse camps
Microsoft Vista Certification Boot
Camp for Vista training boot camps
MCSE Boot Camp location San Francisco and Baltimore
bootcamp_schedule.php
cardpay.php
CCNA-boot-camp.php
certification-courses.php
certified-ethical-hacker-ceh-certified-EC-council.php
cisco-certification-courses.php
comptia_a+_bootcamp_course.php
comptia_a+_network+_boot_camp.php
comptia-certification-courses.php
compTia-network+.php
compTia-security+.php
contact_us.php
course_fees.php
course_template.php
faq_camp.php
guarantee.php
how-boot-camp-works.php
index.php
join-vibrant-as-trainer.php
locations.php
mcsa_server_2012_r2_boot_camp.php
mcsa-windows-server-2016-training-certification-boot-camp.php
mcse-cloud-platform-infrastructure-azure-track.php
mcse-cloud-platform-infrastructure-security-with-mcsa-windows-server-2016-training-certification-boot-camp.php
mcse-cloud-platform-infrastructure-with-mcsa-windows-server-2012-R2-training-certification-boot-camp.php
mcse-productivity-exchange-server-2016.php
microsoft-certification-courses.php
microsoft-mcse-messaging-certification-training-course.php
msca-windows-2016-upgrade.php
msce-windows-2008-to-2016-upgrade.php
msce-windows-2016-upgrade.php
mta-it-infrastructure-windows-server-training-certification.php
onsite-training.php
our-clients.php
photogallery.php
reason_to_join_vibrant_boot_camp.php
recaptchalib.php
refund.php
register.php