Security Controls and Identity Management
contact us contact us

Security Controls and Identity Management

The key tasks of Security and Identity Management include identifying desirable system controls as defined and documented by the client. This step is followed by reviewing implemented system controls through a comprehensive audit of current information systems, identifying controls implemented, and evaluating their effectiveness and completeness through a thorough gap analysis. Finally, recommendations and solutions are made for improvement and enhancement of the system controls. This essentially involves the following two methods.

Business Process Controls and Compliance Management: This approach incorporates the following key elements:

  • Control Objectives: To identify and agree on control objectives
  • Controls Defined: To define system and application controls to be implemented
  • Control Risks: To identify and assess potential risks in the absence of controls
  • Control Techniques: To define methods of implementing controls
  • Control Framework: To define a framework to monitor controls
  • Technology Infrastructure Security: This approach has the following elements:
  • Application Security: Assessment of security level and its effectiveness
  • Platform Security: Review of potential weaknesses in the operating system
  • Network Security: Assessment of current security of internal data network and potential risks for the application
  • Physical Security: Review of users with access to application and backup data
  • Data Store Security: Assessment of security levels implemented for databases and files
  • Operational Sustainability- Assessment of practicality of controls

The NIIT Technologies Advantage">

  • Comprehensive review of controls
  • Integrated framework for security monitoring that leverages customer investments for providing better IT security

Contact us

 

Resource Library

Related Content