Guiding Principles q Define protections that enable trust in the cloud. q Develop cross-platform capabilities and patterns for proprietary and open-source providers. q Will facilitate trusted and efficient access, administration and resiliency to the customer/consumer. q Provide direction to secure information that is protected by regulations. q The Architecture must facilitate proper and efficient identification, authentication, authorization, administration and auditability. q Centralize security policy, maintenance operation and oversight functions. q Access to information must be secure yet still easy to obtain.
Business Operation Support Services (BOSS)
Information Technology Operation & Support (ITOS)
Presentation Services Presentation Platform Presentation Modality Consumer Service Platform
q Delegate or Federate access control where appropriate. q Must be easy to adopt and consume, supporting the design of security patterns
Compliance
q The Architecture must be elastic, flexible and resilient supporting multi-tenant, multi-landlord platforms q The architecture must address and support multiple levels of protection, including network, operating system, and application security needs.
Audit Planning Independent Audits
High Level Use Cases
Third-Party Audits
Internal Audits
Information System Regulatory Mapping
Intellectual Property Protection
Data Classification
Handling / Labeling / Security Policy Rules for Information Leakage Prevention
Clear Desk Policy
DRP Plan Management
Test Management
Architectrure Governance
PMO
Operational Risk Management
Program Mgmnt Project Mgmnt
Segregation of Duties Contractors
Employee Termination Background Screening Roles and Responsibilities
Planning
Testing
Risk Management Framework Business Technical Assessment Assessment
Thank you for interesting in our services. We are a non-profit group that run this website to share documents. We need your help to maintenance this website.