Information Security Future Process Architecture Template

ComponentCurrent Score (0–2)Desired Future Score (0–2)Priority (High, Medium, Low)Desired Time FrameComments
Strategy
  • Written policies in consistent and easy-to-read format

     
  • Easily accessible via company intranet

     
  • Up to date with relevant changes

     
  • Nontechnical and easy to understand

     
  • Broad policies that cover relevant topics

     
  • Incorporate risk analysis and management

     
Components
  • Account administration

     
  • Remote access

     
  • Vulnerability management

     
  • Security awareness

     
  • Emergency response

     
  • Acceptable use of computers, email, Internet

     
Administration
  • Consistent application across company

     
  • Details on how policies will be monitored and enforced

     
  • Active involvement ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.