Nothing Special   »   [go: up one dir, main page]

Components of PMITS

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

1.

Components of PMITS  Determine the requirements

 Define the project specification for the IT security

 Determine what role network project

security plays  Determine the objectives

 Brainstorm various security  Determine the processes

solutions  Check and determine the issue

 Determine the limitations of these tracking and management

solutions systems

 Draft a corporate security project  Understand the approval filters

plan and processes

 Prepare the success metrics 3. Setting up the IT security


project team
 Determine the limitations of the
 Determine the PMITS team
project
requirements
 Check the business strategy and
 Determine the skill set needed to
that of IT security
execute the IT security project
 Check feasibility of IT security
 Determine the roles and
project implementation with work
responsibilities of the individual
culture and policies
team members
2. Organizing or initiating the IT
security project  Check the reporting structure

 List the stakeholders in PMITS needed

 Evaluate and summarize the  Check for the budget and policies

team development plan when it comes to recruiting for

the team
 Identify the limitation involved in  Determine the risks, budget,

staffing for the IT security project schedule, and communication

 Chalk out the process of hiring plans before commencing

(with HR) 5. Managing the IT security


project
 Determine how you will develop
 Start the project with a bang
the IT team
 Determine how to calculate piece
4. Planning the IT security project
by piece of success
 Determine the amount and
 Determine how to organize and
magnitude of the work to be
present data on success
carried out in PMITS
 Check for the documentation and
 Check the scope of the project
guidelines necessary for the IT
defined
security project
 Break down the activities to be
 Indulge in risk management
conducted in smaller tasks and
 Determine how change
sub-tasks
management will take place with
 Put up descriptions for each task
PMITS
and sub-task
 Determine the testing units and
 Determine the quality and value
sessions
adding stream and the value
6. Implementing quality into the
depreciating stream IT security project

 Check adherence to government  Determine the level of quality

rules and regulations needed by the business


 Determine the gap between  Handover the reins to operation

current process quality and managers to carry out the change

optimum or ideal process quality implemented

 Put in place quality metrics  Prepare a solid compliance report

 Enforce standard operational 8. Defining a monitoring and


controlling system for the IT
quality for the IT security project project implementation

 Put in place systems to measure  Define a continuous monitoring

and flag quality milestones strategy for the project

 Enforce quality control and  Clearly check for all legal

assurance parameters adherences and feasibilities

7. Closing the IT security project  Understand laws pertaining to

 Determine what slates the IT unauthorized access

security project as completed  Understand penetration

with regard to PMITS testing and security auditing

 Brainstorm how to close or  Know the reasons for security

pending, open issues and breaches

requests for changes  Know the factors compromising

 Prepare a closure statement and corporate IT data security

report  Understand IT infrastructure

 Prepare for security assessment

deployment/implementation of  Determine the mitigations

the success of the IT security strategies and risks involved

project
 Understand the Health Insurance  Project parameters and metrics

Portability and Accountability Act  Work breakdown structure (WBS)

195 Sarbanes-Oxley Act  Assessment and audit reports

9. Generalized IT security plans  Impact analysis of the IT security


Generalized IT security planning would
project plan
include many generic actions that are
 Constraints of the set project plan
needed as key actions for the

successful completion and  Guidelines for all processes

implementation of the IT security project  Guidelines for wireless audits

as the PMITS. These would include the  Wireless threats and solutions

following: 10. Operational IT security plans

 The role of operational security


 Stages of auditing
assessment and auditing carried
 The role that security assessment
out during the length of the
and auditing carried out during
project
the length of the project
 Set up incident reporting and
 The resources that need these
response processes
set of audits
 Build a response team for
 Risk assessment processes such
operational security
as penetration testing and
 Understand all regulatory issues
scanning for vulnerability
 Understand all
 Authentication and access control
operational security policies
 Entries within reports to different

stakeholders and executives


 Determine disaster recovery

processes for IT operational

security

 Explain the different IT

operational security parameters

 Risks and mitigation strategies to

be employed

 Constraints that can hamper the

operational security and

assumptions that need to be

made

 Determine the impact of Health

Insurance Portability and

Accountability Act, Gramm-

Leach-Bliley Act, and Sarbanes-

Oxley Act on IT operational

security

You might also like