⚙️ Process & Workflows — Security Management
1. Information Security Risk Assessment
Security Risk Assessment Process
Click any step to expand · 6 steps
1
🗂️Asset Identification
2
🔍Threat & Vulnerability Analysis
3
📊Risk ScoringDECISION
4
🛡️Risk Treatment Selection
5
🔧Control Implementation
6
📡Monitoring & Review
2. Vulnerability Management Lifecycle
| Phase | Activities | Frequency |
|---|---|---|
| Discovery | Authenticated vulnerability scans (Nessus, Qualys, Tenable) | Weekly / On-change |
| Assessment | CVSS scoring, asset criticality weighting, exploitability check | Per scan |
| Prioritisation | Patch queue by severity × asset criticality | Per scan |
| Remediation | Patching via Change Management, config hardening, compensating controls | SLA-driven (see below) |
| Verification | Rescan to confirm fix; close ticket | Post-patch |
| Reporting | Mean Time to Remediate (MTTR) by severity, exception tracking | Monthly |
Patch SLA Targets
| Severity | CVSS Score | Patch Target |
|---|---|---|
| Critical | 9.0–10.0 | 24 hours (emergency change) |
| High | 7.0–8.9 | 7 calendar days |
| Medium | 4.0–6.9 | 30 calendar days |
| Low | 0.1–3.9 | Next maintenance window |
3. Security Incident Response Workflow
Security Incident Response
Click any step to expand · 6 steps
1
🚨Detection & Alerting
2
🔒Containment
3
🔬Investigation & Forensics
4
🧹Eradication
5
♻️Recovery
6
📋Post-Incident Review
4. Access Recertification Process
- Schedule: Quarterly for privileged accounts; semi-annual for standard users
- Extract: Pull current access assignments from IAM/directory
- Distribute: Send recertification tasks to access owners via the ITSM tool
- Review: Owner confirms "keep", "modify", or "revoke" for each entitlement
- Enforce: Deprovisioning tickets auto-created for revoked access; completed within SLA
- Report: Completion rate, exceptions, and overdue reviews reported to CISO
5. Key Metrics (KPIs)
| Metric | Target | Frequency |
|---|---|---|
| Mean Time to Detect (MTTD) | < 1 hour | Monthly |
| Mean Time to Contain (MTTC) | < 4 hours | Monthly |
| Mean Time to Remediate Critical Vulns | < 24 hours | Weekly |
| Patch compliance rate | > 95% within SLA | Monthly |
| Phishing click rate (simulations) | < 5% | Quarterly |
| Access recertification completion | > 98% | Quarterly |
| Security training completion | > 95% | Annual |
Downloadable Resources
| Resource | Format | Download |
|---|---|---|
| Risk Register | Excel | ⬇ Download |
| Cybersecurity Checklist | Word | ⬇ Download |
← Back to Security Management Overview