Introduction to COBIT Security Baseline

时间:2026-01-17

COBIT安全基线

An Introduction

Introduction to COBIT Security Baseline

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

COBIT Security Baseline Structure48 Pages

Page 16 - 22

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

The Challenge of Growing Expectations and Emerging Vulnerabilities vs Organisational Capability

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

INTERNAL CONTROLBusiness Controls

Business Processes

Application Controls Generic Process Controlshttp://www.77cn.com.cn

Business Applications

IT Resources and ProcessesCOBIT 4.1© 1996 - 2007 ITGI All rights reserved

General IT ControlsRoger Southgate5

COBIT安全基线

Basic CobiT Principledrive the investments in

which responds to

Business Requirements

Enterprise Information

IT Resources

to deliver

IT Processes

that are used by

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

COBIT Security Baseline Structure48 Pages

Page 16 - 22

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

The COBIT Security Baseline– 44 StepsPlan and OrganiseDefine the security strategy and the information architecture Define the IT Organisation and relationships Communicate management aims and direction Manage IT human resources Assess and manage IT risks

10 steps

Acquire and ImplementIdentify automated solutions Acquire and maintain application technology infrastructure Enable operation and use Manage changes Install and accredit solutions and changes

10 steps

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

The COBIT Security Baseline– 44 StepsDeliver and SupportDefine and manage service levels Manage third-party services Ensure continuous service Manage the configuration Manage data Manage the physical environment

21 steps

Monitor and EvaluateMonitor and evaluate IT performance– assess internal control adequacy Obtain independent assurance Ensure regulatory compliance

3 steps

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

Assess and Manage IT RisksISO/IEC 27002:2005 COBIT 4.1

8

Regularly discuss with key staff (from business and IT management) where and when security problems can adversely impact business objectives and how to protect against them. Prepare a risk management action plan to address all risks according to business risk. Establish staff understanding of the need for responsiveness and consider cost-effective means to manage the identified security risks through security controls (e.g., backup, access control, virus protection, firewalls) and insurance coverage.

4.1

PO2: 2.3 PO9: 9.1, 9.2, 9.3, 9.4 PO9: 9.5, 9.6 PO7: 7.4 AI1: 1.1, 1.2 PO9: 9.5

9 10

4.2

4.1, 4.2, 6.1,

8.2

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

Assessment

Sample of how you can use it

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

Planning the ActionsSample of how you can use it

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

COBIT Security Baseline Structure48 Pages

Page 16 - 22

http://www.77cn.com.cn

COBIT 4.1© 1996 - 2007 ITGI All rights reserved

Roger Southgate

COBIT安全基线

Six Information Security Survival KitsSpecific Information Security Risks 6 Boards of Directors/ Trustees 9 Questions to Ask+ 7 Items to Action

6 Senior Executives 13 Questions to Ask+ 7 Items to Action 6 Executives 13 Questions to Ask+ 17 Items to Action 6 Managers 38 Conditions to Check 5 Professional Users 10“Dos” and 10“Don’ts” 7 Home Users 15 Non Technical Precautions+7 Technicalhttp://www.77cn.com.cn COBIT 4.1© 1996 - 2007 ITGI All rights reserved Roger Southgate14

COBIT安全基线

Information Security Survival KitsSelection of Security precautions for Non-technical Home Users Obtain guidance from qualified and reputable advisors (certified technicians) from time to time to ensure that the computer installation has no significant security flaws. If you depend on computers to do business, sign up for onsite support and ensure the availability of an on-call facility should anything go wrong. Obtain reputable security software. Protection packages can be obtained from all PC software dealers that include all the main functions necessary, e.g., antivirus, spyware, firewall and content filtering. If needed, use a specialist to ensure proper installation. Sign up for automatic updates and maintenance on the security software to ensure that the protection is current and up to date. Do not open unknown e-mail attachments, and be aware that e-mail addresses can be faked. Let the security software check all e-mails and follow the advice given by the tool. Install only official, up-to-date operating systems, security software and applications; avoid installing anything that …… 此处隐藏:4328字,全部文档内容请下载后查看。喜欢就下载吧 ……

Introduction to COBIT Security Baseline.doc 将本文的Word文档下载到电脑

    精彩图片

    热门精选

    大家正在看

    × 游客快捷下载通道(下载后可以自由复制和排版)

    限时特价:4.9 元/份 原价:20元

    支付方式:

    开通VIP包月会员 特价:19元/月

    注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
    微信:fanwen365 QQ:370150219