IT Governance, Risk, and Compliance

Jan 27 2009   8:09PM GMT

Safeguarding Information Assets – Part III



Posted by: Robert Davis
Tags:
CISA
CISM
COBIT
Information Asset Protection
Information Security Governance
Information Security Management
ISACA
IT Controls
Security Frameworks

Protection-of-information-assets reflect the development and deployment of security controls to support ISG. Commonly, protection-of-information-assets require implementing:

  • Logical Access Controls
  • Network Infrastructure Security
  • Physical Access Controls
  • Risk Analysis Processes
  • Environmental Controls
  • Confidentiality Life Cycle Controls

Based on assessed risk, once information security management ratifies information resources protection requirements, information security baselines can be developed and deployed. Safeguarding baselines vary depending on asset sensitivity, criticality, and/or impact. However, minimally, information assets should be protected against misuse, abuse and destruction. When implemented, information assets protection baselines can be expressed as technical, operational and managerial standards applicable throughout the entity.

 Comment on this Post

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: