• HOME
    KOREAN
    CHINESS
    SITE MAP
    JOIN
  • Username (Site Login ID)
  • Password
  • Forgot your password?

  • ±âȹ¡¤Á¶Á÷ | Object to be audited in Plan and Organization | 计划 & 组织

     Check whether the target and scope of the lottery printing business are understood and defined clearly in terms of management of instant lottery based developing business and there is any risk.

    date : 2010-07-13 19:46|hit : 3030
    Organization of security

    Check List

    Roles and responsibilities of organization and job allocation

    Purpose

    To manage information security within the organization

    Audit resources

    Procedure

    Verification

    Document

    Organization structure, R&R organization, Job matrix, Security policy guide, Security process guide

    Product

     

    Detailed study list and method

    -    Check if a management authorization process for new information processing facilities is defined and implemented.

    -    Check if requirements for confidentiality or non-disclosure agreements reflecting the organization¡¯s needs for the protection of information are identified and regularly reviewed.

    -    Check if appropriate contacts with relevant authorities are maintained.

    -    Check if appropriate contacts with special interest groups or other specialist security forums and professional associations are maintained.

    -    Check if the organization¡¯s approach to managing information security and its implementation (i.e. control objectives, controls, policies, processes, and procedures for information security) are reviewed independently at planned intervals, or when significant changes to the security implementation occur.

    -    Check if a Security organizational structure comprised of senior managers is formally established, monitor and review the ISMS, maintain formal minutes of meetings and convene at least every six months.

    -    Check if a Security Function exist that will be responsible to draft and implement security strategies and action plans. It is involved in and review all processes regarding security aspects of the organization, including, but not be limited to, the protection of information, communications, physical infrastructure, and game processes.

    -    Check if the Security Function report to no lower than executive level management and not reside within or report to the IT Function.

    -    Check if the Function is sufficiently empowered, and must have access to all necessary corporate resources to enable the adequate assessment, management, and reduction of risk.

    -    Check if the head of the Security Function is a full member of the Security Forum and be responsible for recommending security policies and changes.

    ¡Ø REFERENCE: ISO27001, A.6.1, Organization of security

    Creative Commons License
    The Criteria to Winner: Security and Risk Management for Printed Lottery by Hyejung Moon is licensed under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.
    Based on a work at www.itpolicy.co.kr.
    Permissions beyond the scope of this license may be available at http://www.lulu.com.

    reply : 0
  • list
  • prev
  • next