Roles and Responsibilities Chart - South Carolina



State of South Carolina Policy Guidance InitiativeRoles and Responsibilities Chart[AGENCY NAME]Agency TeamsResponsibilitiesPolicy ChampionIndividual with a management role in the areas of compliance, information security (InfoSec) and/or technologyLead the information security policy implementation effort for the AgencyIdentify and coordinate with Policy Deployment TeamsLiaison between Agency senior leadership team (i.e. Agency Director) and Policy Deployment Team(s)Policy Deployment Team(s)Collection and review of relevant information securities policies, standards and processesConduct a gap analysis and document a policy implementation plan Identifying and resolving policy deployment challenges and risksDevelop a policy implementation roadmapCoordinate with Policy Champion on policy implementation activitiesPolicy Champion[AGENCY POLICY CHAMPION]State of South CarolinaInformation Security PoliciesPolicy SectionsPolicy Deployment TeamImplementation Role(s)Implementation ResponsibilitiesRevision and Approval (e.g., HR Team, Software Developer, ‘Bob Smith’, etc.)(e.g., document the implementation plan, identify and implement remediation strategies, etc.)(i.e., key stakeholders to review and sign off policies) Access ControlAccess ManagementNetwork Access ManagementIdentity ManagementAuthenticationEmergency AccessPassword PolicyPassword AdministrationAsset ManagementAsset IdentificationBusiness Continuity Management Contingency PlanningDisaster Recovery and Contingency StrategiesData BackupsData Privacy & ProtectionData ClassificationData DisposalData ProtectionPrivacyHR & Security AwarenessHuman Resource ComplianceSecurity Awareness TrainingIT ComplianceAudit and Compliance RequirementsInformation System Audit ConsiderationsReview, Monitoring and Response ProgramIT Risk StrategyEnterprise Architecture SecuritySecurity Performance and MetricsThird Party Risk ManagementInformation System Acquisition, Development & MaintenanceChange ManagementConfiguration ManagementSystem Development and MaintenanceRelease ManagementMaster PolicyInformation Security Program PlanningSecurity Organization (Roles and Responsibilities)Policy Management (Plan of Action)Information Security Controls DeploymentMobile Security Mobile SecurityRemovable Media SecurityLaptop SecurityPhysical & Environmental SecurityPhysical Access and SecurityEnvironmental SecurityDisposal of EquipmentRisk ManagementRisk ManagementRisk AssessmentRisk MitigationThreat & Vulnerability ManagementVulnerability AssessmentIncident ManagementPatch Management ................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download