CHAPTER 3.IT SECURITY CONTROLS

There are few things that can stagger a company more quickly and adversely than the loss of critical software applications and electronic data. A primary responsibility of every controller is to safeguard the enterprise’s assets. As stewards of IT assets, controllers need to thoroughly understand their enterprises’ data-storage and back-up decisions and practices, actively participate with IT to determine the most cost-effective data storage and backup plans based on specific data-loss risks, and regularly monitor back up compliance.

Strong administrative and technical IT controls depend on proper physical security controls being in place. In other words, an administrative policy allowing only authorized employee access to the data center does little good without some kind of physical access control.

This chapter includes the following information to help controllers with IT oversight:

Chapter 3. IT Security Controls
IT Security Scope
Roles and Responsibilities
Top 10 IT Security and Physical IT Security Controls
Security and Privacy Awareness Training
IT Governance
Areas of Focus
Key Components of Successful Governance
The COBIT 5 Framework
COBIT 5 and the Business Model for Information Security (BMIS)
Other IT Internal Control Frameworks and Considerations
Breaches Stemming From Mobile Technology
Physical Security
Preventive, Detective, Corrective, and Recovery Security Controls
ISO IEC 17799: 2005
IT Security for ...

Get The Master Guide to Controllers' Best Practices, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.