INFORMATION SECURITY FOR TREASURY BUSINESS – INFORMATION – TECHNOLOGY + SECURITY DESIGNING A METHODOLOGY FOR SECURITY PROCEDURES AND PROCESSES EISA (Enterprise Information Security Architecture) – a detailed description of security processes and procedures to ensure compliance with enterprise strategic objectives. EISA is about business process improvement, addresses the establishment of business security architecture, secure network infrastructure, security policy and procedures development etc. EISA lays down a foundation for making our system flexible and adaptable to future change. - Unification of development tools
- Unification of DBMS used
- Unification of development environment
- Migration to web-services
- RBAC + SoD
- Dev –> QA –> Prd
ESTABLISHING SECURE INFRASTRUCTURE EISA (Enterprise Information Security Architecture) – a detailed description of security processes and procedures to ensure compliance with enterprise strategic objectives. EISA is about business process improvement, addresses the establishment of business security architecture, secure network infrastructure, security policy and procedures development etc. EISA lays down a foundation for making our system flexible and adaptable to future change.
Documents/Records/Email
Database
Server/Operating System
Application
Network
Physical
External Users
Internal Users
Internal Users
Build sustainable compliance programs
Reduce risk of insider threat and attacks
Identity
Access
Data Protection
Obtaining and using digital certificate
ONCE A CONTRACT WITH THE STATE TREASURY AGENCY HAS BEEN ESTABLISHED, a message with a link is generated to e-mail address of the organization.
A unique 7-digit number of the organization
ID data is entered
CERTIFICATE UPLOAD AND INSTALLATION INSTRUCTIONS SECTION
Installation of user certificates
CC Certificate installation
Installation instructions
once CERTIFICATES HAVE BEEN UPLOADED, INDIVIDUAL CERTIFICATE IS USED for ACCESs
Do'stlaringiz bilan baham: |