Steps
|
Process and Activity
|
Roles
|
Work products
|
Tools
|
Judy contacts the Service Desk to request access.
|

Request Fulfillment

Receive and Approve Service Request
|

Request Analyst
|

Service Request
|
None
|
Service request is routed to appropriate people in charge, and required approvals are gathered.
|

Request Fulfillment

Fulfill or Route Service Request
|

Request Analyst
|

Service Request
|
None
|
Access policies related to roles and responsibilities are examined. Judy's role is changed from sales
specialist to marketing manager.
|

Security Management

Operate Security Protection Mechanisms
|

Security Specialist
|

Security Response
|
|
Access to sales database is revoked and the related account is deleted.
|

Security Management

Operate Security Protection Mechanisms
|

Security Specialist
|

Security Response
|
|
Access to required systems and applications is granted and related accounts are created.
|

Security Management

Operate Security Protection Mechanisms
|

Security Specialist
|

Security Response
|
|
Compliance with the organization's security policy is ensured.
|

Security Management

Monitor, Assess, and Report Security
|

Security Analyst
|

Security Reports
|
|
Service Request is closed.
|

Request Fulfillment

Own, Monitor, Track and Communicate Service Requests
|

Request Analyst
|

Service Request
|
None
|
Judy can now access the required systems and applications to perform her marketing job.
|

Security Management

Operate Security Protection Mechanisms
|
|
|
|
Judy's manager is contacted, recertifying whether she still needs access to the marketing database after 90
days.
|

Security Management

Operate Security Protection Mechanisms
|

Security Specialist
|

Security Monitoring Data
|
|