Find Resources and Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

Subscribe to this discussion

COBIT Focus - Leveraging COBIT to Implement Information Security (Part 2)

Join author John Frisken, as he responds to ISACA member questions beginning 27 July 2015. Add your questions by responding to this post!

You must be logged in and be a member of this group* to participate.
*After logging in click "Join this Community" to the right and then return to this page by clicking the back button. As a member of this topic you can now view this and other discussions from the topic homepage.

This article is a continuation of the article published 4 May 2015 called “Leveraging COBIT to Implement Information Security (Part 1).”

Studies by many organisations have highlighted that companies that are remaining secure are focusing on implementing security controls as an integral part of their IT service management (ITSM) systems, not as stand-alone management systems. Companies that practice configuration management and maintain careful inventories of their hardware and software are staying secure. Those that do not have significantly higher risk, as borne out by security incident studies. 

Many of the items managed within infrastructure management are significant for information security for 2 main reasons: 

  • Loss of configuration information related to any piece of infrastructure represents a significant threat to the ongoing availability of information stored on or managed by that device. 
  • Incorrect configuration of devices such as routers, firewalls and servers represents critical threats that can expose the enterprise to significant loss or corruption of data.
Read the rest of the article here

You must sign in to rate content.
(Unrated)

Comments

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 2)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
Asser478Observer at 7/23/2015 4:29:07 PM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 2)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
Asser478Observer at 7/23/2015 4:29:07 PM Quote
You must sign in to rate content.
(Unrated)

RE: COBIT Focus - Leveraging COBIT to Implement Information Security (Part 2)

An out-of-office message containing personal information or a comment that violates community policies was deleted by the administrator.
Asser478Observer at 7/23/2015 4:29:07 PM Quote
You must sign in to rate content.
(Unrated)

Leave a Comment

* required

You must login to leave a comment.