This service provides business units with a holistic evaluation of risks, inefficiencies, and information security concerns that impact mission and/or business function(s).
When business resources are tight or otherwise allocated, this service provides guidance to maximize security effectiveness given resource constraints.
This service includes:
- Definition of project scope and measure(s) of success
- Consultation with Digital Security and Trust (DST) staff
- Review of relevant policies and procedures
- Review of relevant systems that store, transmit, and process information
Deliverables:
- Comprehensive assessment that identifies strengths and areas that present opportunities for improvement
- Recommendations to address identified areas of concern
- Feedback and consultation on remediation activities
Benefits:
- Focus resources toward value-added activities
- Increase information asset confidentiality, integrity, and availability
Service Work Examples:
- Review a critical data set from inception to destruction, focusing on identifying efficient methods to secure data while accomplishing business objectives
- Improve methods for managing user access to data assets
- Comprehensive review of an enterprise service, with a focus on onboarding and monitoring activities when critical data is involved.
Request this Service
Request Information Security Support via the Service Catalog.