Telegram Group & Telegram Channel
Hello again! 👋 Let's dive a bit deeper into each function for identifying your business environment in the realm of IT Audit and Information Security. We'll also touch on some specific guidance and controls you can implement. 🎯

Expanded Key Functions in Identifying Business Environment 🛠️

1. Know Your Role in the Supply Chain (ID.BE-1) 🛒
- What: Recognise your organisation's part in the supply chain.
- Why: To allocate resources effectively and manage risks.
- Guidance: Use COBIT 5 APO08.04 to manage supplier quality, and ISO 27001 A.15.1.2 to identify and assess supplier risks.

2. Spot in the Industry (ID.BE-2) 🏭
- What: Ascertain your position in your industry or critical infrastructure.
- Why: To align your cybersecurity measures with industry norms.
- Guidance: ISO 27001 Clause 4.1 outlines how to understand the organisation and its context, crucial for this function.

3. Set Priorities (ID.BE-3) 🎯
- What: Establish clear objectives for your mission and activities.
- Why: To concentrate your cybersecurity efforts effectively.
- Guidance: COBIT 5 APO02.06 is great for setting objectives, while NIST SP 800-53 PM-11 talks about mission-based information security.

4. Identify Dependencies (ID.BE-4) 🤝
- What: Recognise what functions or services are pivotal for your business.
- Why: To secure the most critical aspects of your operation.
- Guidance: ISO 27001 A.11.2.2 covers third-party service delivery management, which can be crucial for dependencies.

5. Establish Resilience Requirements (ID.BE-5) 🦸‍♂️
- What: Define what it takes to recover quickly from difficulties.
- Why: To maintain critical services even under adverse conditions.
- Guidance: NIST SP 800-53 CP-11 focuses on contingency and recovery planning, while ISO 27001 A.17.1.1 talks about planning for adverse events.

---

Your Quick Checklist for Identifying Business Environment 📋

1️⃣ Know Your Role in the Supply Chain
- [ ] Conduct a supply chain analysis.
- [ ] Consult COBIT 5 APO08.04 for supplier quality management.
- [ ] Assess supplier risks as per ISO 27001 A.15.1.2.

2️⃣ Spot in the Industry
- [ ] Identify your industry and sub-sector.
- [ ] Follow ISO 27001 Clause 4.1 for understanding organisational context.

3️⃣ Set Priorities
- [ ] Establish clear organisational objectives.
- [ ] Use COBIT 5 APO02.06 for objective setting.
- [ ] Consult NIST SP 800-53 PM-11 for mission-based security.

4️⃣ Identify Dependencies
- [ ] Make a list of critical services and functions.
- [ ] Follow ISO 27001 A.11.2.2 for third-party service management.

5️⃣ Establish Resilience Requirements
- [ ] Develop a contingency plan.
- [ ] Follow NIST SP 800-53 CP-11 for recovery strategies.
- [ ] Use ISO 27001 A.17.1.1 for adverse event planning.

---

Feel free to print this checklist or keep it handy on your digital devices. Tick off each item as you go along, and you'll be well on your way to a more secure and understood business environment. 🌟

Cheers for tuning in, and keep those eyes peeled for more cybersecurity wisdom! 🍻



tg-me.com/IT_Audit/345
Create:
Last Update:

Hello again! 👋 Let's dive a bit deeper into each function for identifying your business environment in the realm of IT Audit and Information Security. We'll also touch on some specific guidance and controls you can implement. 🎯

Expanded Key Functions in Identifying Business Environment 🛠️

1. Know Your Role in the Supply Chain (ID.BE-1) 🛒
- What: Recognise your organisation's part in the supply chain.
- Why: To allocate resources effectively and manage risks.
- Guidance: Use COBIT 5 APO08.04 to manage supplier quality, and ISO 27001 A.15.1.2 to identify and assess supplier risks.

2. Spot in the Industry (ID.BE-2) 🏭
- What: Ascertain your position in your industry or critical infrastructure.
- Why: To align your cybersecurity measures with industry norms.
- Guidance: ISO 27001 Clause 4.1 outlines how to understand the organisation and its context, crucial for this function.

3. Set Priorities (ID.BE-3) 🎯
- What: Establish clear objectives for your mission and activities.
- Why: To concentrate your cybersecurity efforts effectively.
- Guidance: COBIT 5 APO02.06 is great for setting objectives, while NIST SP 800-53 PM-11 talks about mission-based information security.

4. Identify Dependencies (ID.BE-4) 🤝
- What: Recognise what functions or services are pivotal for your business.
- Why: To secure the most critical aspects of your operation.
- Guidance: ISO 27001 A.11.2.2 covers third-party service delivery management, which can be crucial for dependencies.

5. Establish Resilience Requirements (ID.BE-5) 🦸‍♂️
- What: Define what it takes to recover quickly from difficulties.
- Why: To maintain critical services even under adverse conditions.
- Guidance: NIST SP 800-53 CP-11 focuses on contingency and recovery planning, while ISO 27001 A.17.1.1 talks about planning for adverse events.

---

Your Quick Checklist for Identifying Business Environment 📋

1️⃣ Know Your Role in the Supply Chain
- [ ] Conduct a supply chain analysis.
- [ ] Consult COBIT 5 APO08.04 for supplier quality management.
- [ ] Assess supplier risks as per ISO 27001 A.15.1.2.

2️⃣ Spot in the Industry
- [ ] Identify your industry and sub-sector.
- [ ] Follow ISO 27001 Clause 4.1 for understanding organisational context.

3️⃣ Set Priorities
- [ ] Establish clear organisational objectives.
- [ ] Use COBIT 5 APO02.06 for objective setting.
- [ ] Consult NIST SP 800-53 PM-11 for mission-based security.

4️⃣ Identify Dependencies
- [ ] Make a list of critical services and functions.
- [ ] Follow ISO 27001 A.11.2.2 for third-party service management.

5️⃣ Establish Resilience Requirements
- [ ] Develop a contingency plan.
- [ ] Follow NIST SP 800-53 CP-11 for recovery strategies.
- [ ] Use ISO 27001 A.17.1.1 for adverse event planning.

---

Feel free to print this checklist or keep it handy on your digital devices. Tick off each item as you go along, and you'll be well on your way to a more secure and understood business environment. 🌟

Cheers for tuning in, and keep those eyes peeled for more cybersecurity wisdom! 🍻

BY IT Audit and Governance


Warning: Undefined variable $i in /var/www/tg-me/post.php on line 280

Share with your friend now:
tg-me.com/IT_Audit/345

View MORE
Open in Telegram


IT Audit and Governance Telegram | DID YOU KNOW?

Date: |

Traders also expressed uncertainty about the situation with China Evergrande, as the indebted property company has not provided clarification about a key interest payment.In economic news, the Commerce Department reported an unexpected increase in U.S. new home sales in August.Crude oil prices climbed Friday and front-month WTI oil futures contracts saw gains for a fifth straight week amid tighter supplies. West Texas Intermediate Crude oil futures for November rose $0.68 or 0.9 percent at 73.98 a barrel. WTI Crude futures gained 2.8 percent for the week.

Telegram and Signal Havens for Right-Wing Extremists

Since the violent storming of Capitol Hill and subsequent ban of former U.S. President Donald Trump from Facebook and Twitter, the removal of Parler from Amazon’s servers, and the de-platforming of incendiary right-wing content, messaging services Telegram and Signal have seen a deluge of new users. In January alone, Telegram reported 90 million new accounts. Its founder, Pavel Durov, described this as “the largest digital migration in human history.” Signal reportedly doubled its user base to 40 million people and became the most downloaded app in 70 countries. The two services rely on encryption to protect the privacy of user communication, which has made them popular with protesters seeking to conceal their identities against repressive governments in places like Belarus, Hong Kong, and Iran. But the same encryption technology has also made them a favored communication tool for criminals and terrorist groups, including al Qaeda and the Islamic State.

IT Audit and Governance from tr


Telegram IT Audit and Governance
FROM USA