🔒 Security Management
⚙️ Process & Workflows

⚙️ Process & Workflows — Security Management

1. Information Security Risk Assessment

Security Risk Assessment Process

Click any step to expand · 6 steps

1
🗂️Asset Identification

Inventory all information assets: systems, data repositories, APIs, third-party integrations. Assign an asset owner.

Asset inventory registerAsset classification (Public / Internal / Confidential / Restricted)
2
🔍Threat & Vulnerability Analysis
3
📊Risk ScoringDECISION
4
🛡️Risk Treatment Selection
5
🔧Control Implementation
6
📡Monitoring & Review

2. Vulnerability Management Lifecycle

PhaseActivitiesFrequency
DiscoveryAuthenticated vulnerability scans (Nessus, Qualys, Tenable)Weekly / On-change
AssessmentCVSS scoring, asset criticality weighting, exploitability checkPer scan
PrioritisationPatch queue by severity × asset criticalityPer scan
RemediationPatching via Change Management, config hardening, compensating controlsSLA-driven (see below)
VerificationRescan to confirm fix; close ticketPost-patch
ReportingMean Time to Remediate (MTTR) by severity, exception trackingMonthly

Patch SLA Targets

SeverityCVSS ScorePatch Target
Critical9.0–10.024 hours (emergency change)
High7.0–8.97 calendar days
Medium4.0–6.930 calendar days
Low0.1–3.9Next maintenance window

3. Security Incident Response Workflow

Security Incident Response

Click any step to expand · 6 steps

1
🚨Detection & Alerting

SIEM, EDR, or user report generates a security alert. SOC Analyst L1 reviews and performs initial triage within 15 minutes.

Security event ticketInitial severity classification
2
🔒Containment
3
🔬Investigation & Forensics
4
🧹Eradication
5
♻️Recovery
6
📋Post-Incident Review

4. Access Recertification Process

  1. Schedule: Quarterly for privileged accounts; semi-annual for standard users
  2. Extract: Pull current access assignments from IAM/directory
  3. Distribute: Send recertification tasks to access owners via the ITSM tool
  4. Review: Owner confirms "keep", "modify", or "revoke" for each entitlement
  5. Enforce: Deprovisioning tickets auto-created for revoked access; completed within SLA
  6. Report: Completion rate, exceptions, and overdue reviews reported to CISO

5. Key Metrics (KPIs)

MetricTargetFrequency
Mean Time to Detect (MTTD)< 1 hourMonthly
Mean Time to Contain (MTTC)< 4 hoursMonthly
Mean Time to Remediate Critical Vulns< 24 hoursWeekly
Patch compliance rate> 95% within SLAMonthly
Phishing click rate (simulations)< 5%Quarterly
Access recertification completion> 98%Quarterly
Security training completion> 95%Annual

Downloadable Resources

ResourceFormatDownload
Risk RegisterExcel⬇ Download
Cybersecurity ChecklistWord⬇ Download

← Back to Security Management Overview

Digital Kimya — MENA & Europe

Ready to implement what you've read?

Our ITSM practitioners deliver ITIL 4 & 5 projects across ServiceNow, Jira SM, SMAX and BMC Helix — from initial assessment to full ESM deployment.

🚀 ITIL Implementation🔧 ITSM Platform Setup📊 Assessment & Roadmap🏭 Industry-Specific Projects
🌍 MENA & Europe🎯 ITIL 4 & 5 Certified🏢 6 Industries covered Assessment in 2 weeks
contact@digitalkimya.net