Cobit Framework

685 Words2 Pages

This paper outlines some considerations addressing a number of control objectives that is needed when designing an effective security program. The COBIT framework will be utilized to provide control objectives in IT and “Ensure Systems Security”, that covers many of the areas outlined in this paper. The PCS Security Program will adopt a risk management approach to information security. This requires the identification and mitigation of vulnerabilities and threats that can adversely impact PCS information assets. This Information Security Program Charter serves as the high point document for the PCS Information Security Program. I. Scope: This Information Security Program Charter and associated policies, standards, guidelines, and procedures …show more content…

II. Information Security Program Mission Statement Program will use a risk management approach to develop and implement Information Security policies, standards, guidelines, and procedures that address security objectives in tandem with business and operational considerations. The Information Security Program will develop policies to define protection and management objectives for information assets. The Information Security Program will also define acceptable use of PCS information assets. The Information Security Program will attempt to reduce vulnerabilities by developing policies to monitor, identify, assess, prioritize, and manage vulnerabilities and threats. The management activities will support organizational objectives for mitigating, responding to and recovering from identified vulnerabilities and threats. III. Ownership and Responsibilities The Chief Information Officer (CIO) approves the State of PCS Information Security Program Charter. The Information Security Program Charter assigns executive ownership of and accountability for PCS Information Security Program to the Chief Information …show more content…

Enforcement and Exception Handling Failure to comply with PCS Information Security policies, standards, guidelines and procedures can result in disciplinary actions up to and including termination of employment for employees or termination of contracts for contractors, partners, consultants, and other entities. Legal actions also may be taken for violations of applicable regulations and laws. Requests for exceptions PCS Information Security policies, standards, and guidelines should be made on the Request for Exceptions to Information Technology Standards & Policy form (SFN 51687) and submitted to the IT Planning Division of the Information Technology Department. Exceptions shall be permitted only on receipt of written approval from the Information Technology

Open Document