User Tools

Site Tools


policies:security:develandmaint

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
policies:security:develandmaint [2018/01/05 14:46] – [32. New information systems procedure] deulpolicies:security:develandmaint [2018/01/10 13:32] (current) – [39. Calamity procedures] deul
Line 2: Line 2:
 =====Development and Maintenance===== =====Development and Maintenance=====
 ====31. System ownership==== ====31. System ownership====
 +System ownership for scientific systems is driven by the funding mechanism. Many systems are acquired though NWO and EU funding. The PI of the project is by definition the owner of the system. Both functional and technical management are in the hands of the IT Department.
 +
 +For Servers and Desktops the ownership/user is recorded in the CMDB. 
 +
 +For non-scientific information systems, by definition the Scientific Director ([[policies:security:organization|see roles]]) is the owner. But he is allowed to delegate the responsibility to any of his subordinates.
  
 ====32. New information systems procedure==== ====32. New information systems procedure====
-New scientific informations systems will all fall in the 'basic risk' category. For information systems that store personel information extra security measures will be taken to adhere to the GPDR requirements.+New scientific informations systems will all fall in the 'basic risk' category. For information systems that store personel information extra security measures will be taken to adhere to the GDPR requirements.
 ====33. Additional risk analysis==== ====33. Additional risk analysis====
-There are no systems with elevated risks. So no additional risk analysis measures ahve to be taken.+There are no scientific systems with elevated risks. So no additional risk analysis measures have to be taken
 + 
 +For information systems storing personel information additional analysis takes place to adhere to the GDPR requirements.
 ====34. Operational acceptance asset==== ====34. Operational acceptance asset====
 Information systems are implemented in close collaboration with the system owner, but no formal, written acceptance is in place. For systems 'owned' by system management, a team meeting is initiated to formally decide a 'GO' on becoming part of the operational system. Information systems are implemented in close collaboration with the system owner, but no formal, written acceptance is in place. For systems 'owned' by system management, a team meeting is initiated to formally decide a 'GO' on becoming part of the operational system.
Line 21: Line 28:
 The Security manager as defined by the [[policies:security:organization|roles]] is the responsible person for all incidents and works in collaboration with all team members to resolve the incident. The Security manager as defined by the [[policies:security:organization|roles]] is the responsible person for all incidents and works in collaboration with all team members to resolve the incident.
 ====39. Calamity procedures===== ====39. Calamity procedures=====
-There is no true calamity procedure and each case is handled ad hoc, with teh following requirements in mind:+There is no true calamity procedure,  and each case is handled ad hoc, with teh following requirements in mind:
   * Minimize downtime of critical services   * Minimize downtime of critical services
   * Communicate the calamity to all users/steakholders   * Communicate the calamity to all users/steakholders
   * Maximize the collaborative effort within the IT Department team   * Maximize the collaborative effort within the IT Department team
   * Strive to full resolution of the calamity   * Strive to full resolution of the calamity
policies/security/develandmaint.1515163580.txt.gz · Last modified: 2018/01/05 14:46 by deul