S20-Documentation and Processes Flashcards
(50 cards)
IT Governance
specific framework that guides the effective and efficient use of IT to achieve organizational objectives.
Policy
Defines the role of security inside of an organization and establishes the desired end state for that security program
what are the 3 levels in a policy?
- Organizational
- System-specific
- issue-specific
Organizational Policy
Framework to meet the business goals and define the roles, and terms associated with it
System-specific Policy
Addresses the security of a specific technology , application, network, or computer system
Issue-Specific Policy
addresses a specific security issue such as Email privacy, Employee termination procedures, or other specific issues
Baseline
Creates a reference point in network architecture and design
Guideline
Recommended action that allows for exception and allowances in unique situations
Procedure
Detailed Step-by-step instructions created to ensure personnel can perform a given task or series of actions
What are some Common Documentation types?
- Physical Network Diagrams
- Logical Network Diagrams
- Wiring Diagrams
- Site Survey Reports
- Audit and Assessment reports
- Baseline Configs
Physical Network Diagrams
Physical arrangement of network components that show physical connections and locations
Logical Network Diagrams
Logical Arrangement of network components that shows how data flows & how devices communicate
Wiring Diagrams
Labels which cables are connected to which ports
Site Survey Reports (wireless)
Planning and designing a wireless network to deliver the required wireless solution
Audit and Assessment reports
Delivered after a formal assessment has been conducted
Baseline Configs
Set of specs for an information system, or a configuration item within a system, that has been formally reviewed and agreed on
Site Survey Reports (wired)
Determines if a site has the right amount of power, space and cooling to support a new upgrade/installation
Asset Management
Systematic approach to the governance and realization of value of things over their life cycle
What is used to differentiate and identify various assets/
A unique Asset Tag and/or Asset ID
Procurement Lifecycle
Birth to death of an asset
Change Request
Verifies business impact
Procurement
Determines the budget
Deployment
Implements procedures in a secure config
Maintenance/operations
Implements procedures for monitoring and support