Interdependency indicator -
Cooperation Group description EXAMPLE OF IMPLEMENTATION
IT security maintenance procedure
No.:
2.4.1
Domain:
IT security maintenance procedure
• Review the log settings per system. Count the instances where administrator and operator log information is relayed less often that once a minute.
Logs correlation and analysis
No.:
3.1.3
Domain:
Logs correlation and analysis
• Review clock synchronization settings per system. Count systems with a greater period of synchronization than 12 hours. • Count the systems that have an emergency change management procedure. • Count the time needed to perform technical review of an application. • Count the systems that have an emergency change management procedure.
Logging
No.:
3.1.2
Domain:
Logging
• Review the procedure for identification of technical vulnerabilities. Count the systems with a non automatic identification process. • Count the time elapsed between the reporting of a possible information security weakness / event / incident and the response of the organisation.

We use cookies on our website to support technical features that enhance your user experience.
We also use analytics. To opt-out from analytics, click for more information.

I've read it More information