preview

Cobit Security Checklist

Better Essays

Security Checklist for the XYZ Company

1. PO1.3 Assessment of Current Capability and Performance

2. PO2.3 Data Classification Scheme

3. AI6.1 Change Standards and Procedures

4. DS4.1 IT Continuity Framework

5. DS5.2 IT Security Plan

6. DS5.3 Identity Management

7. DS5.5 Security Testing, Surveillance and Monitoring

8. DS5.9 Malicious Software Prevention, Detection, and Correction

9. DS5.10 Network Security

10. ME1.3 Monitoring Method

Supporting Explanation for Check-list Item Number 1

The first step in a security checklist for XYZ Company is COBIT PO1.3, an assessment of the current capability and performance of solution and service delivery. The assessment should measure IT's contribution to business …show more content…

The first is enterprise applications, an example of which would be the inventory management application at XYZ's factories. The inventory management application is important because it allows the factory to operate more efficiently. Another example is the instructions for the machines that package the supplements. The instructions to operate the machines are more valuable because without them, XYZ cannot produce any products, which is its only source of revenue. The best way to obtain information on enterprise applications is to interview the application administrators, since they are the most intimately involved with them. The second logical section of information assets is the individual files on employees' computers. This type will be most prevalent in areas where group work is common, such as research at the universities or sales teams. The best way to obtain this information would be through a survey of all knowledge workers in the organization. Anyone who works with knowledge such as sales, research, or management should be surveyed regarding their information assets.

Throughout the process of classifying the assets, one question that might arise is what granularity should be cataloged into the table. The easiest way to determine how specific the table should be is to ask whether the entire item should be available to anyone who can access it. For instance, should everyone who is able to

Get Access