Skip Ribbon Commands
Skip to main content

Title

4.2.7.4 Approve the Departmental Security Control Profiles

Predecessors

4.2.7.3 Develop Departmental Security Control Profiles

Priority

(2) Normal

Status

Not Started

% Complete

 

Assigned To

 

Description

Once the security control profile(s) are completed, the IT security coordinator should review them and
seek their approval from departmental authorities (e.g., program and service delivery managers, DSO,
deputy head, as required). As part of this process, the IT security coordinator should ensure that the
departmental security controls specified in the profiles satisfy departmental security needs and security
control objectives, and that they adequately address threats. The IT security coordinator should also
ensure that there will be a good balance between the implementation of security controls and the levels of
residual risks that the department is ready to assume.
As per the DDSM [Reference 7], departmental security officers (DSOs) must include the business needs
for security, the security control objectives, and the set of security controls that are necessary to meet
these objectives in their DSP for approval by their deputy head.
The outputs of this activity are approved departmental security control profiles.

Start Date

 

Due Date

 

Project

ITSG 33 Departmental Security Control Profiles

Milestone

4.2 Departmental IT Security Needs & Security Controls

Cost

$0.00

Cost in Days

0.00

Process

 

VisioFlow

 

Attachments

Content Type: Task
Created at 11/25/2013 6:38 PM by System Account
Last modified at 11/25/2013 6:38 PM by System Account