Steps
|
Process and Activity
|
Roles
|
Work products
|
Tools
|
Establish access policies for all information assets.
|

Security Management

Plan and Implement Security Practices
|

Security Manager
|

Security Plan
|
None
|
Implement security policies.
|

Security Management

Plan and Implement Security Practices
|

Security Specialist
|

Security Risk Analysis
|
|
Administer people and their accounts.
|

Security Management

Operate Security Protection Mechanisms
|

Security Specialist
|

Security Response
|
|
Administer the policies and approval claims for all accounts.
|

Security Management

Operate Security Protection Mechanisms
|

Security Specialist
|

Security Response
|
|
Determine if access policies are enforced by comparing local privileges to policies.
|

Compliance Management

Implement Compliance Controls
|

Compliance Manager
|

Compliance Operational Capabilities
|
|
Produce security reports to show access policies are enforced by comparing local privileges to policies.
|

Security Management

Monitor, Assess, and Report Security
|

Security Analyst
|

Security Reports
|
|
Implement audit findings by eliminating any orphan accounts. This is done by matching user accounts with
known identities.
|

Security Management

Operate Security Protection Mechanisms
|

Security Specialist
|

Security Response
|
|