Page 194 - Building Big Data Applications
P. 194

Chapter 10   Building the big data application  193


                 3. Terms and conditions of employment
                     Do the terms and conditions of the employment cover the employee’s re-
                      sponsibility for

                 User training
                 1. Information security education and training
                     Do all employees of the organization and third-party users (where relevant)
                      receive appropriate information security training and regular updates in organi-
                      zational policies and procedures?

                 Responding to security/threat incidents

                 1. Reporting security/threat incidents
                     Does a formal reporting procedure exist, to report security/threat incidents
                      through appropriate management channels as quickly as possible?
                 2. Reporting security weaknesses
                     Does a formal reporting procedure or guideline exist for users, to report security
                      weakness in, or threats to, systems or services?

                 Physical and environmental security

                 1. Equipment location protection
                     Are items requiring special protection isolated to reduce the general level of
                      protection required?
                     Are controls adopted to minimize risk from potential threats such as theft, fire,
                      explosives, smoke, water, vibration, chemical effects, electrical supply interfaces,
                      electromagnetic radiation, and flood?
                 2. Power Supplies
                     Is the equipment protected from power failures by using redundant power sup-
                      plies such as multiple feeds, uninterruptible power supply (ups), backup gener-
                      ator etc.?
                 3. Equipment Maintenance
                     Is maintenance carried out only by authorized personnel?
                     Is the equipment covered by insurance, and are the insurance requirements
                      satisfied?
                 4. Securing of equipment offsite
                     Does any equipment usage outside an organization’s premises for information
                      processing have to be authorized by the management?
                     Is the security provided for equipment while outside the premises equal to or
                      more than the security provided inside the premises?
   189   190   191   192   193   194   195   196   197   198   199