Service |
Service Definition |
Service Features |
Security Strategy Development |
Develop information system-focused Disaster Recovery Plan for customers that is designed to restore the operationsof the target system, application, or computer facility infrastructure at an alternate site in cases of emergency. |
- Risk Assessment
- Business Impact Analysis
- Disaster Recovery Strategy Drafting
- Disaster Recovery Architecture
- Disaster Recovery Plan Drafting
- Disaster Recovery Testing, Training and Exercises
- Disaster Recovery Plan Maintenance
|
Security Policy Development and Maintenance |
Provide security policy development, implementation and maintenance. |
- Information gathering
- Risk Analysis/ Identification of assets
- Defining of roles and Responsibilities
- Writing/ Re-writing Policy
- Implementation and Rollout
- Monitoring, review and communication
- Standards, procedures and guidelines
|
Business Continuity Planning |
Provide customers service packages that identify mission critical business functions and enact policies,processes, plans as well as procedures to ensure continuation of these functions in the case of an unforeseen event. |
- Risk Assessment
- Business Impact Analysis
- Business Continuity Strategy Drafting
- Disaster Recovery Architecture
- Business Continuity Plan Drafting
- Business Continuity Testing, Training and Exercises
- Business Continuity Plan Maintenance
|
Disaster Recovery Planning |
Develop information system-focused Disaster Recovery Plan for customers that is designed to restore the operations of the target system, application, or computer facility infrastructure at an alternate site in cases of emergency. |
- Risk Assessment
- Business Impact Analysis
- Disaster Recovery Strategy Drafting
- Disaster Recovery Architecture
- ICT organisation Assessment
- Disaster Recovery Plan Drafting
- Disaster Recovery Testing, Training and Exercises
- Disaster Recovery Plan Maintenance
|
Risk Management |
Provide customers with an effective way of managing information risk in an environment of business and infrastructure change. |
- Risk identification of risk exposures
- Risk analysis of risk and development of risk control recommendations
- Risk evaluation establishment of an action plan to implement risk controls
- Risk planning involving developing actions to address individual risks
- Risk monitoring and verification that risk is controlled
|
Security Architecture Development and Maintenance |
Provide Security Architecture Development and Maintenance services to ensure solution designs meets the minimum security requirements. |
- Understanding the Business Environment
- Identify and evaluate security architecture
- Establish an approach to developing security architecture
- Produce a business case for developing security architecture
- Create security architectur
- Promote uptake of security architectures
- Manage and maintain the security architecture
|
Security Solution Maintenance and Support |
Assist customers to incorporate security into solution development lifecycle methodologies to support effective information security |
- Requirements analysis
- Architecture and design
- Develop (Build/Configure/Integrate)
- Testing
- Deployment (Pilot, Full-Scale Deployment)
- Operations/ Maintenance
|