Interdependencies between essential and important entities

Interdependency indicator -
Cooperation Group description EXAMPLE OF IMPLEMENTATION
IT security maintenance procedure
No.:
2.4.1
Domain:
IT security maintenance procedure
• Review the log settings per system. Count the instances where administrator and operator log information is relayed less often that once a minute.
Logs correlation and analysis
No.:
3.1.3
Domain:
Logs correlation and analysis
• Review clock synchronization settings per system. Count systems with a greater period of synchronization than 12 hours. • Count the systems that have an emergency change management procedure. • Count the time needed to perform technical review of an application. • Count the systems that have an emergency change management procedure.
Logging
No.:
3.1.2
Domain:
Logging
• Review the procedure for identification of technical vulnerabilities. Count the systems with a non automatic identification process. • Count the time elapsed between the reporting of a possible information security weakness / event / incident and the response of the organisation.

This site uses cookies to offer you a better browsing experience.
Aside from essential cookies we also use tracking cookies for analytics.
Find out more on how we use cookies.

Accept all cookies Accept only essential cookies