Discipline: Security Management
Relationships
Reference Workflows
Security Management
Tasks
Assign Process Responsibilities to Organizations
Communicate and Deploy Framework
Create project proposals
Define Measurements And Controls
Define Process Policies, Standards, and Conceptual Models
Determine Process Data Requirements
Determine process procedures
Determine process relationships to other processes
Identify Process Roles and Responsibilities
Specify Process Purpose, Scope, Goals, and Capabilities
Communicate Results and Recommendations
Develop Security Recommendations
Identify Security Threats
Perform Detailed Risk Assessment of Threats and Vulnerabilities
Project Potential Future IT Threats
Initiate Change Request
Deny Request
Document Security Violation
Initiate Incident
Monitor and Detect for Security Violation
Analyze Request for Information
Define and Build Report
Generate and Communicate Report
Review Active Security Controls
Summarize Inconsistencies
Assess Process Execution
Assess Process Framework
Audit Process
Collect Evaluation Results
Collect Feedback
Communicate to Stakeholders
Complete Evaluation
Produce Gap Analysis
Produce Process Measurements
Recommend Initiatives
Research Trends and Best Practices
Review Existing Documentation
Provide Access to Authorized User
Review Asset Inventory
Identify Security Policy Requirements on Asset Security
Create Asset Security Classification Scheme
Define Overall Security Objectives
Assess Business Policies and Plans
Assess New Technology
Assess Regulations and Standards
Analyze Findings
Assemble and Communicate Security Policy
Define Security Infrastructure
Define Security Plan Procedures
Define Security Plan Schedule
Perform Protection Request
Communicate Security Directives
Complete Security Plan
Review Details of Plan with Stakeholders
Validate Security Request
Monitor Change
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.