Logo
Switch User
Hi, WGAdvisory Admin W
Technical Architecture

Security and Privacy Requirements

STEP 02

a complete review and analysis of the organizations policies pertaining to security/privact, IT Service Management (ITSM), data classification, and Disaster Recovery (DR)/Backup.

Regulatory

An overall snapshot of the current application/workload requirements along with a review of potential migration strategies.

Operational

A review of it Service Management (ITSM) maturity within the organization.

Data Governance

A review of data governance policies.

Data Protection

DR/Backup stratigies are reviewed as part of the requiremnt for an overarching Business Continuity program.

Regulatory

Topic Area Rating
(0 out of 100 / Avg:)
Comments
1. Current policies for information security risks deal with cloud characteristics. (e.g. multi-tenanted environments)

Operational

Topic Area Rating
(0 out of 75 / Avg:)
Comments
1. Roles and responsibilities are clearly defined for ITSM processes. (Change Management, Incident/Problem Management, Asset Management, Knowledge Management)

Data Governance

Topic Area Rating
(0 out of 35 / Avg:)
Comments
1. An Enterprise Data Architecture (EDA) is fully implemented in the application Software Development Lifecycle (SDLC) and existing systems to support a distributed environment between applications and data sets as befits a cloud-based architecture. (This data architecture should seek to minimize replication and duplication of data sets)

Data Protection

Topic Area Rating
(0 out of 60 / Avg:)
Comments
1. Data backup procedures meet the requirements of the business and are well documented.

User Profile 12 messages

Switch User