Control ID |
Control Description |
Coverage in RoD |
---|
ITGC07.Change Management
|
Requests for program changes and system changes (including maintenance) are standardized, logged, evaluated, prioritized and approved. The enterprise maintains a change management repository to track all requested changes, including the status of approved, in-progress and closed changes. IT Management implements system software that does not jeopardize the security of programs or the integrity of data stored on the system. Post-implementation reviews are conducted to confirm outcomes and results.
Control activities:
The Change Management process/procedures are documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
All change requests are documented/logged in a change management repository which includes the description of change. The implementation plan and a backout plan are required for teams with system limitations and not able to follow risk-based automated deployments as documented in the solution development methodology.
All changes are authorized by the business and/or IT owner(s) or designates(s) and medium/high risk changes are reviewed in the weekly Change/Technical Advisory Boards (CAB /TAB)
All changes are tested in a non-production environment prior to production implementation. In cases where testing in a non-production environment is not possible, this is documented within the RFC
Post-implementation validation is conducted and validation results are reviewed
|
Highlighted actions are covered in Release on Demand
Rest of the actions are covered in Continuous Integration & Continuous Deployment
|
|
|
|
|
ITGC08.Emergency Change Management
|
Emergency change requests are documented and subject to formal change management procedures. A post-implementation review is conducted to confirm outcomes and results.
Control activities:
The Emergency Change Management process/procedures are documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
All emergency change requests are documented/logged in a change management repository which includes the description of the emergency change
Emergency changes are authorized by the business and/or IT owner(s) or designates(s). Authorization is automated for teams following risk-based automated deployments.
Post-implementation validation for emergency changes validation results are reviewed
|
Highlighted actions are covered in Release on Demand
Rest of the actions are covered in Continuous Integration & Continuous Deployment
|
|
|
|
ITGC09.Promotion to Production
|
A process is established to restrict access to authorized individuals functions only for the migration of accepted solutions/software releases into production.
Control activities:
Promotion to production process/procedures are documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis, for each system with a procedural SOD in place
Proper segregation of duties is established between staff functions responsible for program development, promoting changes to production, and IT operational support
|
Highlighted action is covered in Continuous Deployment & Release on Demand
First action is covered in Continuous Exploration
|
|
|
|
ITGC13.Configuration Management and Monitoring of Configuration Change
|
A process is established for implementing and maintaining security configurations, and for monitoring security configuration changes.
Control activities:
Security configuration management process/procedures are documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
Systems are configured in accordance with security configuration baselines/standards
Changes to security configurations are monitored, and deviations are followed-up on and resolved
|
Highlighted action is covered in Release on Demand
|
|
|
|
ITGC14.Job Scheduling and Monitoring
|
IT Management has documented and established IT operational procedures, including job scheduling changes/events and incident management processes, to ensure the integrity of batch processing.
Control activities:
IT operational procedures are documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
Job schedules are maintained and batch/backup jobs are monitored
Job failures are documented, followed-up on and resolved
|
Highlighted action is covered in Release on Demand
|
|
|
|
ITGC15.Incident Management
|
IT Management has defined and implemented an incident management system such that operational issues, data integrity issues and security-related issues are recorded, analyzed, resolved in a timely manner and reported to Management.
Control activities:
The incident management process is documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
Incidents are documented/logged within an incident management repository which include the description of the incident, incident analysis/diagnostics, resolution steps, historical activity and response time
Incidents are assigned a priority level based on risk and impact to the organization
Incidents are escalated in accordance with the incident management process
Incidents are resolved on a timely basis (based on incident management process documentation) and incident tickets are closed upon verification from or with notification to the affected user(s)
Service Management reports are reviewed and signed-off by the IT owner(s) on a monthly basis
|
All actions are covered in Release on Demand
|
|
|
|
ITGC16.Problem Management
|
IT Management has defined and implemented a problem management system such that operational issues, data integrity issues and security-related issues are recorded, analyzed, resolved in a timely manner and reported to Management.
Control activities:
The problem management process is documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
Problems are documented/logged within a problem management repository which include the problem description, historical activity, root cause analysis and resolution steps
Note: Problems identified through incidents, have corresponding incident tickets referenced
Problems are assigned a priority level based on risk and impact to the organization
Problems are resolved and problem tickets are closed
Service Management reports are reviewed and signed-off by the IT owner(s) on a monthly basis
|
All actions are covered in Release on Demand
|
|
|
|
ITGC17.Backup Monitoring
|
IT Management has implemented a strategy for cyclical backup of data and programs.
Control activities
Backup and Recovery procedures are documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
Application, platform/server and database backups are performed on a scheduled basis based on backup and recovery requirements
Backup jobs are monitored to ensure that the jobs run to completion without errors
Backup job failures are documented, followed-up on and rectified based on business requirements
Backup media are stored at an off-site location
|
All actions are covered in Release on Demand
|
|
|
|
ITGC18.Backup Media Testing
|
The restoration of information is periodically tested.
Control activities:
The backup media testing process is documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
Testing of the restoration from backup media is conducted periodically and test results are reviewed and signed-off by the IT owner(s)
|
All actions are covered in Release on Demand
|
|
|
|
ITGC20.Security Event Monitoring
|
IT Security monitors and logs security activity at the network, platform/server, and database levels and identified security violations are reported to Management.
Control activities:
Security Information and Event Management (SIEM) process/procedures are documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
Security logging is enabled at the network, platform/server and database levels and complies with Information Security standards
Security logs are sent to the SIEM tool for monitoring, and security events are assessed to determine if they are security violations
Security violations are documented/logged which include the description of the security violation, analysis/diagnostics, resolution steps, historical activity and response time
Security violations are followed-up on, resolved by IT Security and reported to Management
|
All actions are covered in Release on Demand
|
|
|
|
ITGC21.User Access Provisioning/23.Segregation of Duties
|
Procedures exist and are followed relating to timely action for requesting, granting, suspending and closing user accounts. Controls relating to appropriate segregation of duties (SoD) over requesting and granting access to systems and data exist and are followed.
Control activities:
Identity and Access Management process/procedures are documented/updated and reviewed/signed-off by the IT owner(s) on a periodic basis
User access to networks, applications, platforms/servers and databases are requested, documented and approved by the business and/or IT owner(s)
User access is provisioned in accordance with roles and responsibilities, and proper segregation of duties exists for requesting and granting access to systems and data
User account terminations are processed on a timely basis
|
All actions are covered in Release on Demand
|
|
|
|
ITGC24.Threat and Vulnerability Management
|
Appropriate controls, including firewalls, intrusion prevention/detection systems and vulnerability assessments, exist and are used to prevent and detect unauthorized access to information assets.
Control activities:
Networks are protected utilizing firewalls and intrusion prevention/detection systems
Anti-malware software is deployed, virus definitions are up-to-date, and scans are performed to detect malware on the networks, platforms/servers and workstations
Vulnerability scans and assessments are performed on a periodic basis
Network penetration testing is performed on a periodic basis
Vulnerability assessment and penetration testing results are documented, reviewed and signed-off by the IT owner(s)
Vulnerability assessment and penetration testing issues are followed-up on, investigated and resolved based on risk and impact to the organization
System security software/patches are applied in a timely manner
|
|
|