Information Security: You Have Choices


Security process blade

Security is one of the process blades of Disciplined DevOps. The focus of the Security process blade is to describe how to protect your organization from both information/virtual and physical threats. This includes procedures for security governance, identity and access management, vulnerability management, security policy management, incident response, and vulnerability management. As you would expect these policies will affect your organization’s strategies around change management, disaster recovery and business continuity, solution delivery, and vendor management. For security to be effective it has to be a fundamental aspect of your organizational culture.

The following process goal diagram overviews the potential activities associated with disciplined agile security. These activities are performed by, or at least supported by, your security (often called an information security or infosec) team.

Figure 1. The Security process goal diagram (click to enlarge).

Security process goal diagram

The process factors that you need to consider for implementing effective security are:

  1. Ensure security readiness. How do you ensure that your environment has been built to withstand the evolving security threats that you face?  
  2. Enable security awareness. How do you help your staff to become knowledgeable about security threats, how to avoid attacks, and how to deal with them when they occur?
  3. Monitor security. How do you identify when you are under attack (for most organizations the answer is constantly) and more importantly how you’re being attacked?
  4. Respond to threats. When an attack occurs what will you do to address it?
  5. Security physical assets. How will you protect physical assets such as buildings, vehicles, and equipment?  By implication, how will you ensure the security of your people?
  6. Secure IT perimeter. How will you secure access to your IT systems?
  7. Secure the network. How will you ensure the security of digital communications?
  8. Secure IT endpoints. How will you secure access to devices such as phones, workstations, and other I/O devices?
  9. Secure applications. How will you address security within the applications/systems of your organization?
  10. Secure data. How will you ensure the validity and privacy of the data within your organization?
  11. Govern security. How will you motivate, enable, and monitor security activities within your organization?

Further Reading

Have any Question or Comment?

Leave a Reply

Your email address will not be published. Required fields are marked *

Categories

Archives