Information security for treasury business – information – technology + security designing a methodology for security procedures and processes


Download 1.66 Mb.
Sana25.10.2023
Hajmi1.66 Mb.
#1719489
Bog'liq
information security for treasury eng

INFORMATION SECURITY FOR TREASURY BUSINESS – INFORMATION – TECHNOLOGY + SECURITY

DESIGNING A METHODOLOGY FOR SECURITY PROCEDURES AND PROCESSES

EISA (Enterprise Information Security Architecture) – a detailed description of security processes and procedures to ensure compliance with enterprise strategic objectives.

EISA is about business process improvement, addresses the establishment of business security architecture, secure network infrastructure, security policy and procedures development etc.

EISA lays down a foundation for making our system flexible and adaptable to future change.

Unification of development tools

  • Unification of development tools
  • Unification of DBMS used
  • Unification of development environment
  • Migration to web-services
  • RBAC + SoD
  • Dev –> QA –> Prd

ESTABLISHING SECURE INFRASTRUCTURE

EISA (Enterprise Information Security Architecture) – a detailed description of security processes and procedures to ensure compliance with enterprise strategic objectives.

EISA is about business process improvement, addresses the establishment of business security architecture, secure network infrastructure, security policy and procedures development etc.

EISA lays down a foundation for making our system flexible and adaptable to future change.


Documents/Records/Email
Database
Server/Operating System
Application
Network
Physical
External Users
Internal Users
Internal Users
Build sustainable compliance programs
Reduce risk of insider threat and attacks
Identity
Access
Data Protection
Obtaining and using digital certificate

ONCE A CONTRACT WITH THE STATE TREASURY AGENCY HAS BEEN ESTABLISHED, a message with a link is generated to e-mail address of the organization.


A unique 7-digit number of the organization
ID data is entered

CERTIFICATE UPLOAD AND INSTALLATION INSTRUCTIONS SECTION


Installation of user certificates
CC Certificate installation
Installation instructions

once CERTIFICATES HAVE BEEN UPLOADED, INDIVIDUAL CERTIFICATE IS USED for ACCESs


Download 1.66 Mb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling