Evaluate: Formulating Policies, and Frameworks
Every business enterprise has its own unique organisation hierarchy, process flow, technology used, information asset, risk, threat landscape, vulnerability and security need. As part of the evaluating process we study all those aspects that influence their security requirement. Based on the requirement study security objectives are set with the formulation of security policies and frameworks. Enterprise-specific customised Information Technology Policy, Information Security Policy, Cyber Security Framework, Cyber Crisis Management Plan are prepared by us and approved by the Board of Directors. These policy documents are periodically reviewed, revised, and approved for the entire organisation to follow and practice.
Execute: Conducting Awareness, Training, and Compliance
Information Security or Cyber security per se is still a very new domain for the common people. People still fail to appreciate the impact of many of their acts of omission or commission which has a severe security implication e.g. sharing information casually on social media, or carelessly managing passwords. Hence awareness and training about the company policy is very imperative for compliance requirements. Known vulnerabilities are too addressed as a part of executing process.
Monitor: Vulnerability Assessment, Security Auditing, and Penetration Testing:
Monitoring is a very crucial activity to ensure business continuity. This is similar to the fire drill conducted by administrative department. The purpose of a fire drill is to assess the enterprise’s readiness to deal with actual fire if that happens. But monitoring process goes a few steps ahead by ensuring that the root cause of fire too is addressed. The Vulnerability Assessment and Penetration Testing (VAPT), Information Security Auditing (ISA) aims at discovering the vulnerability, in the people, processes, and technologies. These discoveries lead to renewed security objectives and revised security policies and frameworks.
Additionally, the monitoring process pre-empts any malicious attempt to take advantage of any security vulnerability.