Enterprise Policies, Standards, and Guidelines
Enterprise Policies, Standards, and Guidelines
Introduction
This site contains the currently published State of Georgia enterprise policies, standards and guidelines (PSGs).
PSGs in this website are organized following the controls framework advanced by the ITGovernance Institute in a publication entitled Control Objectives for Information and related Technology (COBIT) version 4.1. Cobit provides good practices across a process framework in a manageable and logical structure. The State of Georgia enterprise policies, standards and guidelines are mapped to the Cobit framework accessible through the full index found at the right of the screen. Where the State of Georgia has not published specific PSGs, the framework entry will be so noted.
Working definitions for the terms "policy", "standard" and "guideline" as used by the Georgia Technology Authority (GTA) are as follows:
- Policy – A general or high level statement of a direction, purpose, principle, process, method, or procedure for managing technology and technology resources.
- Standard – A prescribed or proscribed specification, approach, directive, procedure, solution, methodology, product or protocol which must be followed.
- Guideline – A guideline is similar to either a standard or a policy, in that it outlines a specific principle, direction, directive, specification, or procedure but is not binding. Rather, a guideline is a recommended course of action.
Plan and Organize
Plan and Organize
This domain covers strategy and tactics, and identifies the best ways for IT to contribute to the achievement of business objectives. The realization of the strategic vision needs to be planned, communicated and managed for different perspectives. A proper organization as well as technological infrastructure should be put in place. This domain typically addresses the following management questions:
• Are IT and the business strategy aligned?
• Is the enterprise achieving optimum use of its resources?
• Does everyone in the organization understand the IT objectives?
• Are IT risks understood and being managed?
• Is the quality of IT systems appropriate for business needs?
Define a Strategic IT Plan
Define a Strategic IT Plan
IT strategic planning is required to manage and direct all IT resources in line with the business strategy and priorities. The IT function and business stakeholders are responsible for ensuring that optimal value is realized from project and service portfolios. The strategic plan improves key stakeholders’ understanding of IT opportunities and limitations, assesses current performance, identifies capacity and human resource requirements, and clarifies the level of investment required. The business strategy and priorities are to be reflected in portfolios and executed by the IT tactical plan(s), which specifies concise objectives, action plans and tasks that are understood and accepted by both business and IT.
IT Value Management
IT Value Management
The processes of IT working with the business to ensure that the enterprise portfolio of IT-enabled investments have solid business cases that provide for transparent, repeatable and comparable evaluation, including financial worth, the risk of not delivering a capability and the risk of not realizing the expected benefits. Providing effective, efficient and accountable delivery of the IT services with early warning of any deviations from plan, including cost, schedule or functionality.
Business - IT Alignment
Business - IT Alignment
Establish bi-directional education and reciprocal involvement in strategic planning to achieve business and IT alignment and integration. Mediate between business and IT imperatives so priorities can be mutually agreed.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Assessment of Current Capability and Performance
Assessment of Current Capability and Performance
Establish a baseline of capabilities and performance against which future requirements can be compared. Define performance in terms of IT’s contribution to business objectives, functionality, stability, complexity, costs, strengths and weaknesses.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
IT Strategic Plan
IT Strategic Plan
Create a strategic plan that defines, in co-operation with relevant stakeholders, how IT goals will contribute to the enterprise’s strategic objectives and related costs and risks. The strategic plan should be sufficiently detailed to allow for the definition of tactical IT plans.
IT Tactical Plan
IT Tactical Plan
Create a portfolio of tactical IT plans describing IT-enabled investments that are derived from the IT strategic plan. Actively manage the set of tactical IT plans and initiatives through analysis of project and service portfolios.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
IT Portfolio Management
IT Portfolio Management
Joint management of IT and the business of the portfolio of IT-enabled investments required to achieve specific strategic business objectives. Processes include identifying, defining, evaluating, prioritizing, selecting, initiating, managing and controlling investments and projects.
Define the Information Architecture
Define the Information Architecture
The information systems function creates and regularly updates a business information model and defines the appropriate systems to optimize the use of this information. This encompasses the development of a corporate data dictionary with the organization’s data syntax rules, data classification scheme and security levels. This process improves the quality of management decision making by making sure that reliable and secure information is provided, and it enables rationalizing information systems resources to appropriately match business strategies. This IT process is also needed to increase accountability for the integrity and security of data and to enhance the effectiveness and control of sharing information across applications and entities.
Enterprise Information Architecture Model
Enterprise Information Architecture Model
Establish and maintain an enterprise information model to enable applications development and decision-supporting activities, consistent with business and IT plans. The model should facilitate the optimal creation, use and sharing of information by the business in a way that maintains integrity and is flexible, functional, cost-effective, timely, secure and resilient to failure.
Enterprise Data Dictionary and Data Syntax Rules
Enterprise Data Dictionary and Data Syntax Rules
Maintain an enterprise data dictionary that incorporates the organization’s data syntax rules. This dictionary should enable the sharing of data elements among applications and systems, promote a common understanding of data among IT and business users, and prevent incompatible data elements from being created.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Data Classification Scheme
Data Classification Scheme
Establish a classification scheme that applies throughout the enterprise, based on the criticality and of enterprise data. This scheme should include details about data ownership; definition of appropriate security levels and protection controls; and a brief description of data retention and destruction requirements, criticality and sensitivity. It should be used as the basis for applying controls such as access controls, archiving or encryption.
Integrity Management
Integrity Management
Define and implement procedures to ensure the integrity and consistency of all data stored in electronic form, such as databases, data warehouses and data archives.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Determine Technological Direction
Determine Technological Direction
The information services function determines the technology direction to support the business. This requires the creation of a technological infrastructure plan and an architecture board that sets and manages clear and realistic expectations of what technology can offer in terms of products, services and delivery mechanisms. The plan is regularly updated and encompasses aspects such as systems architecture, technological direction, acquisition plans, standards, migration strategies and contingency. This enables timely responses to changes in the competitive environment, economies of scale for information systems staffing and investments, as well as improved interoperability of platforms and applications.
Technological Direction Planning
Technological Direction Planning
Analyze existing and emerging technologies, and plan which technological direction is appropriate to realize the IT strategy and the business systems architecture. Also identify in the plan which technologies have the potential to create business opportunities. The plan should address systems architecture, technological direction, migration strategies and contingency aspects of infrastructure components.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Technology Infrastructure Plan
Technology Infrastructure Plan
Create and maintain a technology infrastructure plan that is in accordance with the IT strategic and tactical plans. The plan should be based on the technological direction and include contingency arrangements and direction for acquisition of technology resources. It should consider changes in the competitive environment, economies of scale for information systems staffing and investments, and improved interoperability of platforms and applications.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Monitor Future Trends and Regulations
Monitor Future Trends and Regulations
Establish a process to monitor the business sector, industry, technology, infrastructure, legal and regulatory environment trends. Incorporate the consequences of these trends into the development of the IT technology infrastructure plan.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Technology Standards
Technology Standards
To provide consistent, effective and secure technological solutions enterprise-wide, establish a technology forum to provide technology guidelines, advice on infrastructure products and guidance on the selection of technology, and measure compliance with these standards and guidelines. This forum should direct technology standards and practices based on their business relevance, risks and compliance with external requirements.
IT Architecture Board
IT Architecture Board
Establish an IT architecture board to provide architecture guidelines and advice on their application, and to verify compliance. This entity should direct IT architecture design, ensuring that it enables the business strategy and considers regulatory compliance and continuity requirements.
Define the IT Processes, Organization and Relationships
Define the IT Processes, Organization and Relationships
An IT organization is defined by considering requirements for staff, skills, functions, accountability, authority, roles and responsibilities, and supervision. This organization is embedded into an IT process framework that ensures transparency and control as well as the involvement of senior executives and business management. A strategy committee ensures board oversight of IT, and one or more steering committees in which business and IT participate determine the prioritization of IT resources in line with business needs. Processes, administrative policies and procedures are in place for all functions, with specific attention to control, quality assurance, risk management, information security, data and systems ownership, and segregation of duties. To ensure timely support of business requirements, IT is to be involved in relevant decision processes.
IT Process Framework
IT Process Framework
Define an IT process framework to execute the IT strategic plan. This framework should include an IT process structure and relationships (e.g., to manage process gaps and overlaps), ownership, maturity, performance measurement, improvement, compliance, quality targets and plans to achieve them. It should provide integration among the processes that are specific to IT, enterprise portfolio management, business processes and business change processes, and be integrated into a quality management system (QMS) and the internal control framework.
IT Strategy Committee
IT Strategy Committee
Establish an IT strategy committee at the board level. This committee should ensure that IT governance, as part of enterprise governance, is adequately addressed; advise on strategic direction; and review major investments on behalf of the full board.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
IT Steering Committee
IT Steering Committee
Establish an IT steering committee (or equivalent) composed of executive, business and IT management to:
- Determine prioritization of IT-enabled investments in line with the enterprise’s business strategy and priorities
- Track status of projects and resolve resource conflict
- Monitor service levels and service improvements
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Organizational Placement of the IT Function
Organizational Placement of the IT Function
Place the IT function in the overall organizational structure so as to emphasize the importance of IT within the enterprise, specifically its criticality to business strategy and the level of operational dependence on IT. The reporting line of the CIO should be commensurate with the importance of IT within the enterprise.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
IT Organizational Structure
IT Organizational Structure
Establish an internal and external IT organizational structure that reflects business needs. In addition, put a process in place for periodically reviewing the IT organizational structure to adjust staffing requirements and sourcing strategies to meet expected business objectives and changing circumstances.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Establishment of Roles and Responsibilities
Establishment of Roles and Responsibilities
Establish and communicate roles and responsibilities for IT personnel and end users that delineate between IT personnel and end-user authority, responsibilities and accountability for meeting the organization’s needs.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Responsibility for IT Quality Assurance
Responsibility for IT Quality Assurance
Assign responsibility for the performance of the quality assurance (QA) function and provide the QA group with appropriate QA systems, controls and communications expertise. Ensure that the organizational placement and the responsibilities and size of the QA group satisfy the requirements of the organization.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Responsibility for Risk, Security and Compliance
Responsibility for Risk, Security and Compliance
Embed ownership and responsibility for IT-related risks within the business at an appropriate senior level. Define and assign roles critical for managing IT risks, including the specific responsibility for information security, physical security and compliance. Establish risk and security management responsibility at the enterprise level to deal with organization-wide issues. Additional security management responsibilities may need to be assigned at a system-specific level to deal with related security issues. Obtain direction from senior management on the appetite for IT risk and approval of any residual IT risks.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Data and System Ownership
Data and System Ownership
Provide the business with procedures and tools, enabling it to address its responsibilities for ownership of data and information systems. Owners should make decisions about classifying information and systems and protecting them in line with this classification.
Supervision
Supervision
Implement adequate supervisory practices in the IT function to ensure that roles and responsibilities are properly exercised, to assess whether all personnel have sufficient authority and resources to execute their roles and responsibilities, and to generally review KPIs.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Segregation of Duties
Segregation of Duties
Implement a division of roles and responsibilities that reduces the possibility for a single individual to compromise a critical process. Make sure that personnel are performing only authorized duties relevant to their respective jobs and positions.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
IT Staffing
IT Staffing
Evaluate staffing requirements on a regular basis or upon major changes to the business, operational or IT environments to ensure that the IT function has sufficient resources to adequately and appropriately support the business goals and objectives.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Key IT Personnel
Key IT Personnel
Define and identify key IT personnel, and minimize reliance on a single individual performing a critical job function.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Contracted Staff Policies and Procedures
Contracted Staff Policies and Procedures
Ensure that consultants and contract personnel who support the IT function know and comply with the organization’s policies for the protection of the organization’s information assets such that they meet agreed-upon contractual requirements.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Relationships
Relationships
Establish and maintain an optimal co-ordination, communication and liaison structure between the IT function and various other interests inside and outside the IT function, such as the board, executives, business units, individual users, suppliers, security officers, risk managers, the corporate compliance group, outsourcers and offsite management.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Manage the IT Investment
Manage the IT Investment
A framework is established and maintained to manage IT-enabled investment programs and that encompasses cost, benefits, prioritization within budget, a formal budgeting process and management against the budget. Stakeholders are consulted to identify and control the total costs and benefits within the context of the IT strategic and tactical plans, and initiate corrective action where needed. The process fosters partnership between IT and business stakeholders; enables the effective and efficient use of IT resources; and provides transparency and accountability into the total cost of ownership (TCO), the realization of business benefits and the ROI of IT-enabled investments.
Financial Management Framework
Financial Management Framework
Establish and maintain a financial framework to manage the investment and cost of IT assets and services through portfolios of IT- enabled investments, business cases and IT budgets.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Prioritization Within IT Budget
Prioritization Within IT Budget
Implement a decision-making process to prioritize the allocation of IT resources for operations, projects and maintenance to maximize IT’s contribution to optimizing the return on the enterprise’s portfolio of IT-enabled investments.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
IT Budgeting
IT Budgeting
Establish and implement practices to prepare a budget reflecting the priorities established by the enterprise’s portfolio of IT-enabled investments, and including the ongoing costs of operating and maintaining the current infrastructure. The practices should support development of an overall IT budget as well as development of budgets for individual IT services. The practices should allow for ongoing review, refinement and approval of the overall budget and the budgets for individual IT services.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Cost Management
Cost Management
Implement a cost management process comparing actual costs to budgets. Costs should be monitored and reported. Where there are deviations, these should be identified in a timely manner and the impact of those deviations should be assessed. Together with the business sponsor of those costed services, appropriate remedial action should be taken and, if necessary, the service business case should be updated.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Benefit Management
Benefit Management
Implement a process to monitor the benefits from providing and maintaining appropriate IT capabilities. IT’s contribution to the business, either as a component of IT-enabled investments or as part of regular operational support, should be identified and documented in a business case, agreed to, monitored and reported. Reports should be reviewed and, where there are opportunities to improve IT’s contribution, appropriate actions should be defined and taken. Where changes in IT’s contribution impact the service or where changes to other related projects impact the service, the service business case should be updated.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Communicate Management Aims and Direction
Communicate Management Aims and Direction
Management develops an enterprise IT control framework and defines and communicates policies. An ongoing communication program is implemented to articulate the mission, service objectives, policies and procedures, etc., approved and supported by management. The communication supports achievement of IT objectives and ensures awareness and understanding of business and IT risks, objectives and direction. The process ensures compliance with relevant laws and regulations.
IT Policy and Control Environment
IT Policy and Control Environment
Define the elements of a control environment for IT, aligned with the enterprise’s management philosophy and operating style. These elements should include expectations/requirements regarding delivery of value from IT investments, appetite for risk, integrity, ethical values, staff competence, accountability and responsibility. The control environment should be based on a culture that supports value delivery whilemanaging significant risks, encourages cross-divisional co-operation and teamwork, promotes compliance and continuous process improvement, and handles process deviations (including failure) well.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Enterprise IT Risk and Control Framework
Enterprise IT Risk and Control Framework
Develop and maintain a framework that defines the enterprise’s overall approach to IT risk and control and that aligns with the IT policy and control environment and the enterprise risk and control framework.
IT Policies Management
IT Policies Management
Develop and maintain a set of policies to support IT strategy. These policies should include policy intent; roles and responsibilities; exception process; compliance approach; and references to procedures, standards and guidelines. Their relevance should be confirmed and approved regularly.
Policy, Standard and Procedures Rollout
Policy, Standard and Procedures Rollout
Roll out and enforce IT policies to all relevant staff, so they are built into and are an integral part of enterprise operations.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Communication of IT Objectives and Direction
Communication of IT Objectives and Direction
Communicate awareness and understanding of business and IT objectives and direction to appropriate stakeholders and users throughout the enterprise.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Manage IT Human Resources
Manage IT Human Resources
A competent workforce is acquired and maintained for the creation and delivery of IT services to the business. This is achieved by following defined and agreed-upon practices supporting recruiting, training, evaluating performance, promoting and terminating. This process is critical, as people are important assets, and governance and the internal control environment are heavily dependent on the motivation and competence of personnel.
Personnel Recruitment and Retention
Personnel Recruitment and Retention
Maintain IT personnel recruitment processes in line with the overall organization’s personnel policies and procedures (e.g., hiring, positive work environment, orienting). Implement processes to ensure that the organization has an appropriately deployed IT workforce with the skills necessary to achieve organizational goals.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Personnel Competencies
Personnel Competencies
Regularly verify that personnel have the competencies to fulfill their roles on the basis of their education, training and/or experience. Define core IT competency requirements and verify that they are being maintained, using qualification and certification program where appropriate.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Staffing of Roles
Staffing of Roles
Define, monitor and supervise roles, responsibilities and compensation frameworks for personnel, including the requirement to adhere to management policies and procedures, the code of ethics, and professional practices. The level of supervision should be in line with the sensitivity of the position and extent of responsibilities assigned.
Personnel Training
Personnel Training
Provide IT employees with appropriate orientation when hired and ongoing training to maintain their knowledge, skills, abilities, internal controls and security awareness at the level required to achieve organizational goals.
Dependence Upon Individuals
Dependence Upon Individuals
Minimize the exposure to critical dependency on key individuals through knowledge capture (documentation), knowledge sharing, succession planning and staff backup.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Personnel Clearance Procedures
Personnel Clearance Procedures
Include background checks in the IT recruitment process. The extent and frequency of periodic reviews of these checks should depend on the sensitivity and/or criticality of the function and should be applied for employees, contractors and vendors.
Employee Job Performance Evaluation
Employee Job Performance Evaluation
Require a timely evaluation to be performed on a regular basis against individual objectives derived from the organization’s goals, established standards and specific job responsibilities. Employees should receive coaching on performance and conduct whenever appropriate.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Job Change and Termination
Job Change and Termination
Take expedient actions regarding job changes, especially job terminations. Knowledge transfer should be arranged, responsibilities reassigned and access rights removed such that risks are minimized and continuity of the function is guaranteed.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
Manage Quality
Manage Quality
A QMS is developed and maintained that includes proven development and acquisition processes and standards. This is enabled by planning, implementing and maintaining the QMS by providing clear quality requirements, procedures and policies. Quality requirements are stated and communicated in quantifiable and achievable indicators. Continuous improvement is achieved by ongoing monitoring, analysis and acting upon deviations, and communicating results to stakeholders. Quality management is essential to ensure that IT is delivering value to the business, continuous improvement and transparency for stakeholders.
Quality Management System
Quality Management System
Establish and maintain a QMS that provides a standard, formal and continuous approach regarding quality management that is aligned with business requirements. The QMS should identify quality requirements and criteria; key IT processes and their sequence and interaction; and the policies, criteria and methods for defining, detecting, correcting and preventing non-conformity. The QMS should define the organizational structure for quality management, covering the roles, tasks and responsibilities. All key areas should develop their quality plans in line with criteria and policies and record quality data. Monitor and measure the effectiveness and acceptance of the QMS, and improve it when needed.
There are no PSGs published for this topic; however, the topic is under review for future PSGs.
IT Standards and Quality Practices
IT Standards and Quality Practices
Identify and maintain standards, procedures and practices for key IT processes to guide the organization in meeting the intent of the QMS. Use industry good practices for reference when improving and tailoring the organization’s quality practices.
Development and Acquisition Standards
Development and Acquisition Standards
Adopt and maintain standards for all development and acquisition that follow the life cycle of the ultimate deliverable, and include sign-off at key milestones based on agreed-upon sign-off criteria. Consider software coding standards; naming conventions; file formats; schema and data dictionary design standards; user interface standards; interoperability; system performance efficiency; scalability; standards for development and testing; validation against requirements; test plans; and unit, regression and integration testing.
Customer Focus
Customer Focus
Focus quality management on customers by determining their requirements and aligning them to the IT standards and practices. Define roles and responsibilities concerning conflict resolution between the user/customer and the IT organization.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Continuous Improvement
Continuous Improvement
Maintain and regularly communicate an overall quality plan that promotes continuous improvement.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Quality Measurement, Monitoring and Review
Quality Measurement, Monitoring and Review
Define, plan and implement measurements to monitor continuing compliance to the QMS, as well as the value the QMS provides. Measurement, monitoring and recording of information should be used by the process owner to take appropriate corrective and preventive actions.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Assess and Manage IT Risks
Assess and Manage IT Risks
A risk management framework is created and maintained. The framework documents a common and agreed-upon level of IT risks, mitigation strategies and residual risks. Any potential impact on the goals of the organization caused by an unplanned event is identified, analyzed and assessed. Risk mitigation strategies are adopted to minimize residual risk to an accepted level. The result of the assessment is understandable to the stakeholders and expressed in financial terms, to enable stakeholders to align risk to an acceptable level of tolerance.
IT Risk Management Framework
IT Risk Management Framework
Establish an IT risk management framework that is aligned to the organization’s (enterprise’s) risk management framework.
Establishment of Risk Context
Establishment of Risk Context
Establish the context in which the risk assessment framework is applied to ensure appropriate outcomes. This should include determining the internal and external context of each risk assessment, the goal of the assessment, and the criteria against which risks are evaluated.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Event Identification
Event Identification
Identify events (an important realistic threat that exploits a significant applicable vulnerability) with a potential negative impact on the goals or operations of the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operational aspects. Determine the nature of the impact and maintain this information. Record and maintain relevant risks in a risk registry.
Risk Assessment
Risk Assessment
Assess on a recurrent basis the likelihood and impact of all identified risks, using qualitative and quantitative methods. The likelihood and impact associated with inherent and residual risk should be determined individually, by category and on a portfolio basis.
Risk Response
Risk Response
Develop and maintain a risk response process designed to ensure that cost-effective controls mitigate exposure to risks on a continuing basis. The risk response process should identify risk strategies such as avoidance, reduction, sharing or acceptance; determine associated responsibilities; and consider risk tolerance levels.
Maintenance and Monitoring of a Risk Action Plan
Maintenance and Monitoring of a Risk Action Plan
Prioritize and plan the control activities at all levels to implement the risk responses identified as necessary, including identification of costs, benefits and responsibility for execution. Obtain approval for recommended actions and acceptance of any residual risks, and ensure that committed actions are owned by the affected process owner(s). Monitor execution of the plans, and report on any deviations to senior management.
Manage Projects
Manage Projects
A program and project management framework for the management of all IT projects is established. The framework ensures the correct prioritization and co-ordination of all projects. The framework includes a master plan, assignment of resources, definition of deliverables, approval by users, a phased approach to delivery, QA, a formal test plan, and testing and post-implementation review after installation to ensure project risk management and value delivery to the business. This approach reduces the risk of unexpected costs and project cancellations, improves communications to and involvement of business and end users, ensures the value and quality of project deliverables, and maximizes their contribution to IT-enabled investment programs.
Program Management Framework
Program Management Framework
Maintain the program of projects, related to the portfolio of IT-enabled investments. Co-ordinate the activities and interdependencies of multiple projects, manage the contribution of all the projects within the program to expected outcomes, and resolve resource requirements and conflicts.
Project Management Framework
Project Management Framework
Establish and maintain a project management framework that defines the scope and boundaries of managing projects, as well as the method to be adopted and applied to each project undertaken. The framework and supporting method should be integrated with the program management processes.
Project Management Approach
Project Management Approach
Establish a project management approach commensurate with the size, complexity and regulatory requirements of each project. The project governance structure can include the roles, responsibilities and accountabilities of the program sponsor, project sponsors, steering committee, project office and project manager, and the mechanisms through which they can meet those responsibilities (such as reporting and stage reviews). Make sure all IT projects have sponsors with sufficient authority to own the execution of the project within the overall strategic program.
Stakeholder Commitment
Stakeholder Commitment
Obtain commitment and participation from the affected stakeholders in the definition and execution of the project within the context of the overall IT-enabled investment program.
Project Scope Statement
Project Scope Statement
Define and document the nature and scope of the project to confirm and develop amongst stakeholders a common understanding of project scope and how it relates to other projects within the overall IT-enabled investment program. The definition should be formally approved by the program and project sponsors before project initiation.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Project Phase Initiation
Project Phase Initiation
Approve the initiation of each major project phase and communicate it to all stakeholders. Base the approval of the initial phase on program governance decisions. Approval of subsequent phases should be based on review and acceptance of the deliverables of the previous phase, and approval of an updated business case at the next major review of the program. In the event of overlapping project phases, an approval point should be established by program and project sponsors to authorize project progression.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Integrated Project Plan
Integrated Project Plan
Establish a formal, approved integrated project plan (covering business and information systems resources) to guide project execution and control throughout the life of the project. The activities and interdependencies of multiple projects within a program should be understood and documented. The project plan should be maintained throughout the life of the project. The project plan, and changes to it, should be approved in line with the program and project governance framework.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Project Resources
Project Resources
Define the responsibilities, relationships, authorities and performance criteria of project team members, and specify the basis for acquiring and assigning competent staff members and/or contractors to the project. The procurement of products and services required for each project should be planned and managed to achieve project objectives using the organization’s procurement practices.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Project Risk Management
Project Risk Management
Eliminate or minimize specific risks associated with individual projects through a systematic process of planning, identifying, analyzing, responding to, monitoring and controlling the areas or events that have the potential to cause unwanted change. Risks faced by the project management process and the project deliverable should be established and centrally recorded.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Project Quality Plan
Project Quality Plan
Prepare a quality management plan that describes the project quality system and how it will be implemented. The plan should be formally reviewed and agreed to by all parties concerned and then incorporated into the integrated project plan.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Project Change Control
Project Change Control
Establish a change control system for each project, so all changes to the project baseline (e.g., cost, schedule, scope, quality) are appropriately reviewed, approved and incorporated into the integrated project plan in line with the program and project governance framework.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Project Planning of Assurance Methods
Project Planning of Assurance Methods
Identify assurance tasks required to support the accreditation of new or modified systems during project planning, and include them in the integrated project plan. The tasks should provide assurance that internal controls and security features meet the defined requirements.
Project Performance Measurement, Reporting and Monitoring
Project Performance Measurement, Reporting and Monitoring
Measure project performance against key project performance scope, schedule, quality, cost and risk criteria. Identify any deviations from the plan. Assess the impact of deviations on the project and overall program, and report results to key stakeholders. Recommend, implement and monitor remedial action, when required, in line with the program and project governance framework.
Project Closure
Project Closure
Require that, at the end of each project, the project stakeholders ascertain whether the project delivered the planned results and benefits. Identify and communicate any outstanding activities required to achieve the planned results of the project and the benefits of the program, and identify and document lessons learned for use on future projects and programs.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Acquire and Implement
Acquire and Implement
To realize the IT strategy, IT solutions need to be identified, developed or acquired, as well as implemented and integrated into the business process. In addition, changes in and maintenance of existing systems are covered by this domain to make sure the solutions continue to meet business objectives. This domain typically addresses the following management questions:
• Are new projects likely to deliver solutions that meet business needs?
• Are new projects likely to be delivered on time and within budget?
• Will the new systems work properly when implemented?
• Will changes be made without upsetting current business operations?
Identify Automated Solutions
Identify Automated Solutions
The need for a new application or function requires analysis before acquisition or creation to ensure that business requirements are satisfied in an effective and efficient approach. This process covers the definition of the needs, consideration of alternative sources, review of technological and economic feasibility, execution of a risk analysis and cost-benefit analysis, and conclusion of a final decision to ‘make’ or ‘buy’. All these steps enable organizations to minimize the cost to acquire and implement solutions while ensuring that they enable the business to achieve its objectives.
Definition and Maintenance of Business Functional and Technical Requirements
Definition and Maintenance of Business Functional and Technical Requirements
Identify, prioritize, specify and agree on business functional and technical requirements covering the full scope of all initiatives required to achieve the expected outcomes of the IT-enabled investment program.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Risk Analysis Report
Risk Analysis Report
Identify, document and analyze risks associated with the business requirements and solution design as part of the organization’s process for the development of requirements.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Feasibility Study and Formulation of Alternative Courses of Action
Feasibility Study and Formulation of Alternative Courses of Action
Develop a feasibility study that examines the possibility of implementing the requirements. Business management, supported by the IT function, should assess the feasibility and alternative courses of action and make a recommendation to the business sponsor.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Requirements and Feasibility Decision and Approval
Requirements and Feasibility Decision and Approval
Verify that the process requires the business sponsor to approve and sign off on business functional and technical requirements and feasibility study reports at predetermined key stages. The business sponsor should make the final decision with respect to the choice of solution and acquisition approach.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Acquire and Maintain Application Software
Acquire and Maintain Application Software
Applications are made available in line with business requirements. This process covers the design of the applications, the proper inclusion of application controls and security requirements, and the development and configuration in line with standards. This allows organizations to properly support business operations with the correct automated applications.
High-level Design
High-level Design
Translate business requirements into a high-level design specification for software acquisition, taking into account the organization’s technological direction and information architecture. Have the design specifications approved by management to ensure that the high-level design responds to the requirements. Reassess when significant technical or logical discrepancies occur during development or maintenance.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Detailed Design
Detailed Design
Prepare detailed design and technical software application requirements. Define the criteria for acceptance of the requirements. Have the requirements approved to ensure that they correspond to the high-level design. Perform reassessment when significant technical or logical discrepancies occur during development or maintenance.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Application Control and Auditability
Application Control and Auditability
Implement business controls, where appropriate, into automated application controls such that processing is accurate, complete, timely, authorized and auditable.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Application Security and Availability
Application Security and Availability
Address application security and availability requirements in response to identified risks and in line with the organization’s data classification, information architecture, information security architecture and risk tolerance.
Configuration and Implementation of Acquired Application Software
Configuration and Implementation of Acquired Application Software
Configure and implement acquired application software to meet business objectives.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Major Upgrades to Existing Systems
Major Upgrades to Existing Systems
In the event of major changes to existing systems that result in significant change in current designs and/or functionality, follow a similar development process as that used for the development of new systems.
There are no PSGs published for this topic; however, the topic is under review for future PSGs |
Development of Application Software
Development of Application Software
Ensure that automated functionality is developed in accordance with design specifications, development and documentation standards, QA requirements, and approval standards. Ensure that all legal and contractual aspects are identified and addressed for application software developed by third parties.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Software Quality Assurance
Software Quality Assurance
Develop, resource and execute a software QA plan to obtain the quality specified in the requirements definition and the organization’s quality policies and procedures.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Applications Requirements Management
Applications Requirements Management
Track the status of individual requirements (including all rejected requirements) during the design, development and implementation, and approve changes to requirements through an established change management process.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Application Software Maintenance
Application Software Maintenance
Develop a strategy and plan for the maintenance of software applications.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Acquire and Maintain Technology Infrastructure
Acquire and Maintain Technology Infrastructure
Organizations have processes for the acquisition, implementation and upgrade of the technology infrastructure. This requires a planned approach to acquisition, maintenance and protection of infrastructure in line with agreed-upon technology strategies and the provision of development and test environments. This ensures that there is ongoing technological support for business applications.
Technological Infrastructure Acquisition Plan
Technological Infrastructure Acquisition Plan
Produce a plan for the acquisition, implementation and maintenance of the technological infrastructure that meets established business functional and technical requirements and is in accord with the organization’s technology direction.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Infrastructure Resource Protection and Availability
Infrastructure Resource Protection and Availability
Implement internal control, security and auditability measures during configuration, integration and maintenance of hardware and infrastructural software to protect resources and ensure availability and integrity. Responsibilities for using sensitive infrastructure components should be clearly defined and understood by those who develop and integrate infrastructure components. Their use should be monitored and evaluated.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Infrastructure Maintenance
Infrastructure Maintenance
Develop a strategy and plan for infrastructure maintenance, and ensure that changes are controlled in line with the organization’s change management procedure. Include periodic reviews against business needs, patch management, upgrade strategies, risks, vulnerabilities assessment and security requirements.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Feasibility Test Environment
Feasibility Test Environment
Establish development and test environments to support effective and efficient feasibility and integration testing of infrastructure components.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Enable Operation and Use
Enable Operation and Use
Knowledge about new systems is made available. This process requires the production of documentation and manuals for users and IT, and provides training to ensure the proper use and operation of applications and infrastructure.
Planning for Operational Solutions
Planning for Operational Solutions
Develop a plan to identify and document all technical, operational and usage aspects such that all those who will operate, use and maintain the automated solutions can exercise their responsibility.
Knowledge Transfer to Business Management
Knowledge Transfer to Business Management
Transfer knowledge to business management to allow those individuals to take ownership of the system and data, and exercise responsibility for service delivery and quality, internal control, and application administration.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Knowledge Transfer to End Users
Knowledge Transfer to End Users
Transfer knowledge and skills to allow end users to effectively and efficiently use the system in support of business processes.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Knowledge Transfer to Operations and Support Staff
Knowledge Transfer to Operations and Support Staff
Transfer knowledge and skills to enable operations and technical support staff to effectively and efficiently deliver, support and maintain the system and associated infrastructure.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Procure IT Resources
Procure IT Resources
IT resources, including people, hardware, software and services, need to be procured. This requires the definition and enforcement of procurement procedures, the selection of vendors, the setup of contractual arrangements, and the acquisition itself. Doing so ensures that the organization has all required IT resources in a timely and cost-effective manner.
Procurement Control
Procurement Control
Develop and follow a set of procedures and standards that is consistent with the business organization’s overall procurement process and acquisition strategy to acquire IT-related infrastructure, facilities, hardware, software and services needed by the business.
Supplier Contract Management
Supplier Contract Management
Set up a procedure for establishing, modifying and terminating contracts for all suppliers. The procedure should cover, at a minimum, legal, financial, organizational, documentary, performance, security, intellectual property, and termination responsibilities and liabilities (including penalty clauses). All contracts and contract changes should be reviewed by legal advisers.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Supplier Selection
Supplier Selection
Select suppliers according to a fair and formal practice to ensure a viable best fit based on specified requirements. Requirements should be optimized with input from potential suppliers.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
IT Resources Acquisition
IT Resources Acquisition
Protect and enforce the organization’s interests in all acquisition contractual agreements, including the rights and obligations of all parties in the contractual terms for the acquisition of software, development resources, infrastructure and services.
Manage Changes
Manage Changes
All changes, including emergency maintenance and patches, relating to infrastructure and applications within the production environment are formally managed in a controlled manner. Changes (including those to procedures, processes, system and service parameters) are logged, assessed and authorized prior to implementation and reviewed against planned outcomes following implementation. This assures mitigation of the risks of negatively impacting the stability or integrity of the production environment.
Change Standards and Procedures
Change Standards and Procedures
Set up formal change management procedures to handle in a standardized manner all requests (including maintenance and patches) for changes to applications, procedures, processes, system and service parameters, and the underlying platforms.
Impact Assessment, Prioritization and Authorization
Impact Assessment, Prioritization and Authorization
Assess all requests for change in a structured way to determine the impact on the operational system and its functionality. Ensure that changes are categorized, prioritized and authorized.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Emergency Changes
Emergency Changes
Establish a process for defining, raising, testing, documenting, assessing and authorizing emergency changes that do not follow the established change process.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Change Status Tracking and Reporting
Change Status Tracking and Reporting
Establish a tracking and reporting system to document rejected changes, communicate the status of approved and in-process changes, and complete changes. Make certain that approved changes are implemented as planned.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Change Closure and Documentation
Change Closure and Documentation
Whenever changes are implemented, update the associated system and user documentation and procedures accordingly.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Install and Accredit Solutions and Changes
Install and Accredit Solutions and Changes
New systems need to be made operational once development is complete. This requires proper testing in a dedicated environment with relevant test data, definition of rollout and migration instructions, release planning and actual promotion to production, and a post-implementation review. This assures that operational systems are in line with the agreed-upon expectations and outcomes.
Training
Training
Train the staff members of the affected user departments and the operations group of the IT function in accordance with the defined training and implementation plan and associated materials, as part of every information systems development, implementation or modification project.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Test Plan
Test Plan
Establish a test plan based on organization-wide standards that defines roles, responsibilities, and entry and exit criteria. Ensure that the plan is approved by relevant parties.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Implementation Plan
Implementation Plan
Establish an implementation and fallback/backout plan. Obtain approval from relevant parties.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Test Environment
Test Environment
Define and establish a secure test environment representative of the planned operations environment relative to security, internal controls, operational practices, data quality and privacy requirements, and workloads.
System and Data Conversion
System and Data Conversion
Plan data conversion and infrastructure migration as part of the organization’s development methods, including audit trails, rollbacks and fallbacks.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Testing of Changes
Testing of Changes
Test changes independently in accordance with the defined test plan prior to migration to the operational environment. Ensure that the plan considers security and performance.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Final Acceptance Test
Final Acceptance Test
Ensure that business process owners and IT stakeholders evaluate the outcome of the testing process as determined by the test plan. Remediate significant errors identified in the testing process, having completed the suite of tests identified in the test plan and any necessary regression tests. Following evaluation, approve promotion to production.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Promotion to Production
Promotion to Production
Following testing, control the handover of the changed system to operations, keeping it in line with the implementation plan. Obtain approval of the key stakeholders, such as users, system owner and operational management. Where appropriate, run the system in parallel with the old system for a while, and compare behavior and results.
Post-Implementation Review
Post-Implementation Review
Establish procedures in line with the organizational change management standards to require a post-implementation review as set out in the implementation plan.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Deliver and Support
Deliver and Support
This domain is concerned with the actual delivery of required services, which includes service delivery, management of security and continuity, service support for users, and management of data and operational facilities. It typically addresses the following management questions:
• Are IT services being delivered in line with business priorities?
• Are IT costs optimized?
• Is the workforce able to use the IT systems productively and safely?
• Are adequate confidentiality, integrity and availability in place for information security?
Define and Manage Service Levels
Define and Manage Service Levels
Effective communication between IT management and business customers regarding services required is enabled by a documented definition of and agreement on IT services and service levels. This process also includes monitoring and timely reporting to stakeholders on the accomplishment of service levels. This process enables alignment between IT services and the related business requirements.
Service Level Management Framework
Service Level Management Framework
Define a framework that provides a formalized service level management process between the customer and service provider. The framework should maintain continuous alignment with business requirements and priorities and facilitate common understanding between the customer and provider(s). The framework should include processes for creating service requirements, service definitions, SLAs, OLAs and funding sources. These attributes should be organized in a service catalogue. The framework should define the organizational structure for service level management, covering the roles, tasks and responsibilities of internal and external service providers and customers.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Definition of Services
Definition of Services
Base definitions of IT services on service characteristics and business requirements. Ensure that they are organized and stored centrally via the implementation of a service catalogue portfolio approach.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Service Level Agreements
Service Level Agreements
Define and agree to SLAs for all critical IT services based on customer requirements and IT capabilities. This should cover customer commitments; service support requirements; quantitative and qualitative metrics for measuring the service signed off on by the stakeholders; funding and commercial arrangements, if applicable; and roles and responsibilities, including oversight of the SLA. Consider items such as availability, reliability, performance, capacity for growth, levels of support, continuity planning, security and demand constraints.
Operating Level Agreements
Operating Level Agreements
Define OLAs that explain how the services will be technically delivered to support the SLA(s) in an optimal manner. The OLAs should specify the technical processes in terms meaningful to the provider and may support several SLAs.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Monitoring and Reporting of Service Level Achievements
Monitoring and Reporting of Service Level Achievements
Continuously monitor specified service level performance criteria. Reports on achievement of service levels should be provided in a format that is meaningful to the stakeholders. The monitoring statistics should be analyzed and acted upon to identify negative and positive trends for individual services as well as for services overall.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Review of Service Level Agreements and Contracts
Review of Service Level Agreements and Contracts
Regularly review SLAs and underpinning contracts (UCs) with internal and external service providers to ensure that they are effective, up to date and that changes in requirements have been taken into account.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Manage Third-Party Services
Manage Third-Party Services
The need to assure that services provided by third parties (suppliers, vendors and partners) meet business requirements requires an effective third-party management process. This process is accomplished by clearly defining the roles, responsibilities and expectations in third-party agreements as well as reviewing and monitoring such agreements for effectiveness and compliance. Effective management of third-party services minimizes the business risk associated with non-performing suppliers.
Identification of All Supplier Relationships
Identification of All Supplier Relationships
Identify all supplier services, and categorize them according to supplier type, significance and criticality. Maintain formal documentation of technical and organizational relationships covering the roles and responsibilities, goals, expected deliverables, and credentials of representatives of these suppliers.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Supplier Relationship Management
Supplier Relationship Management
Formalize the supplier relationship management process for each supplier. The relationship owners should liaise on customer and supplier issues and ensure the quality of the relationship based on trust and transparency (e.g., through SLAs).
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Supplier Risk Management
Supplier Risk Management
Identify and mitigate risks relating to suppliers’ ability to continue effective service delivery in a secure and efficient manner on a continual basis. Ensure that contracts conform to universal business standards in accordance with legal and regulatory requirements. Risk management should further consider non-disclosure agreements (NDAs), escrow contracts, continued supplier viability, conformance with security requirements, alternative suppliers, penalties and rewards, etc.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Supplier Performance Monitoring
Supplier Performance Monitoring
Establish a process to monitor service delivery to ensure that the supplier is meeting current business requirements and continuing to adhere to the contract agreements and SLAs, and that performance is competitive with alternative suppliers and market conditions.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Manage Performance and Capacity
Manage Performance and Capacity
The need to manage performance and capacity of IT resources requires a process to periodically review current performance and capacity of IT resources. This process includes forecasting future needs based on workload, storage and contingency requirements. This process provides assurance that information resources supporting business requirements are continually available.
Performance and Capacity Planning
Performance and Capacity Planning
Establish a planning process for the review of performance and capacity of IT resources to ensure that cost-justifiable capacity and performance are available to process the agreed-upon workloads as determined by the SLAs. Capacity and performance plans should leverage appropriate modeling techniques to produce a model of the current and forecasted performance, capacity and throughput of the IT resources.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Current Performance and Capacity
Current Performance and Capacity
Assess current performance and capacity of IT resources to determine if sufficient capacity and performance exist to deliver against agreed-upon service levels.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Future Performance and Capacity
Future Performance and Capacity
Conduct performance and capacity forecasting of IT resources at regular intervals to minimize the risk of service disruptions due to insufficient capacity or performance degradation, and identify excess capacity for possible redeployment. Identify workload trends and determine forecasts to be input to performance and capacity plans.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
IT Resources Availability
IT Resources Availability
Provide the required capacity and performance, taking into account aspects such as normal workloads, contingencies, storage requirements and IT resource life cycles. Provisions such as prioritizing tasks, fault-tolerance mechanisms and resource allocation practices should be made. Management should ensure that contingency plans properly address availability, capacity and performance of individual IT resources.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Monitoring and Reporting
Monitoring and Reporting
Continuously monitor the performance and capacity of IT resources. Data gathered should serve two purposes:
- To maintain and tune current performance within IT and address such issues as resilience, contingency, current and projected workloads, storage plans, and resource acquisition
- To report delivered service availability to the business, as required by the SLAs
Accompany all exception reports with recommendations for corrective action.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Ensure Continuous Service
Ensure Continuous Service
The need for providing continuous IT services requires developing, maintaining and testing IT continuity plans, utilizing offsite backup storage and providing periodic continuity plan training. An effective continuous service process minimizes the probability and impact of a major IT service interruption on key business functions and processes.
IT Continuity Framework
IT Continuity Framework
Develop a framework for IT continuity to support enterprise-wide business continuity management using a consistent process. The objective of the framework should be to assist in determining the required resilience of the infrastructure and to drive the development of disaster recovery and IT contingency plans. The framework should address the organizational structure for continuity management, covering the roles, tasks and responsibilities of internal and external service providers, their management and their customers, and the planning processes that create the rules and structures to document, test and execute the disaster recovery and IT contingency plans. The plan should also address items such as the identification of critical resources, noting key dependencies, the monitoring and reporting of the availability of critical resources, alternative processing, and the principles of backup and recovery.
IT Continuity Plans
IT Continuity Plans
Develop IT continuity plans based on the framework and designed to reduce the impact of a major disruption on key business functions and processes. The plans should be based on risk understanding of potential business impacts and address requirements for resilience, alternative processing and recovery capability of all critical IT services. They should also cover usage guidelines, roles and responsibilities, procedures, communication processes, and the testing approach.
Critical IT Resources
Critical IT Resources
Focus attention on items specified as most critical in the IT continuity plan to build in resilience and establish priorities in recovery situations. Avoid the distraction of recovering less-critical items and ensure response and recovery in line with prioritized business needs, while ensuring that costs are kept at an acceptable level and complying with regulatory and contractual requirements. Consider resilience, response and recovery requirements for different tiers, e.g., one to four hours, four to 24 hours, more than 24 hours and critical business operational periods.
Maintenance of the IT Continuity Plan
Maintenance of the IT Continuity Plan
Encourage IT management to define and execute change control procedures to ensure that the IT continuity plan is kept up to date and continually reflects actual business requirements. Communicate changes in procedures and responsibilities clearly and in a timely manner.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Testing of the IT Continuity Plan
Testing of the IT Continuity Plan
Test the IT continuity plan on a regular basis to ensure that IT systems can be effectively recovered, shortcomings are addressed and the plan remains relevant. This requires careful preparation, documentation, reporting of test results and, according to the results, implementation of an action plan. Consider the extent of testing recovery of single applications to integrated testing scenarios to end-to-end testing and integrated vendor testing.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
IT Continuity Plan Training
IT Continuity Plan Training
Provide all concerned parties with regular training sessions regarding the procedures and their roles and responsibilities in case of an incident or disaster. Verify and enhance training according to the results of the contingency tests.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Distribution of the IT Continuity Plan
Distribution of the IT Continuity Plan
Determine that a defined and managed distribution strategy exists to ensure that plans are properly and securely distributed and available to appropriately authorized interested parties when and where needed. Attention should be paid to making the plans accessible under all disaster scenarios.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
IT Services Recovery and Resumption
IT Services Recovery and Resumption
Plan the actions to be taken for the period when IT is recovering and resuming services. This may include activation of backup sites, initiation of alternative processing, customer and stakeholder communication, and resumption procedures. Ensure that the business understands IT recovery times and the necessary technology investments to support business recovery and resumption needs.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Offsite Backup Storage
Offsite Backup Storage
Store offsite all critical backup media, documentation and other IT resources necessary for IT recovery and business continuity plans. Determine the content of backup storage in collaboration between business process owners and IT personnel. Management of the offsite storage facility should respond to the data classification policy and the enterprise’s media storage practices. IT management should ensure that offsite arrangements are periodically assessed, at least annually, for content, environmental protection and security. Ensure compatibility of hardware and software to restore archived data, and periodically test and refresh archived data.
Post-resumption Review
Post-resumption Review
Determine whether IT management has established procedures for assessing the adequacy of the plan in regard to the successful resumption of the IT function after a disaster, and update the plan accordingly.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Ensure Systems Security
Ensure Systems Security
The need to maintain the integrity of information and protect IT assets requires a security management process. This process includes establishing and maintaining IT security roles and responsibilties, policies, standards, and procedures. Security management also includes performing security monitoring and periodic testing and implementing corrective actions for identified security weaknesses or incidents. Effective security management protects all IT assets to minimize the business impact of security vulnerabilities and incidents
Management of IT Security
Management of IT Security
Manage IT security at the highest appropriate organizational level, so the management of security actions is in line with business requirements.
IT Security Plan
IT Security Plan
Translate business, risk and compliance requirements into an overall IT security plan, taking into consideration the IT infrastructure and the security culture. Ensure that the plan is implemented in security policies and procedures together with appropriate investments in services, personnel, software and hardware. Communicate security policies and procedures to stakeholders and users.
Identity Management
Identity Management
Ensure that all users (internal, external and temporary) and their activity on IT systems (business application, IT environment, system operations, development and maintenance) are uniquely identifiable. Enable user identities via authentication mechanisms. Confirm that user access rights to systems and data are in line with defined and documented business needs and that job requirements are attached to user identities. Ensure that user access rights are requested by user management, approved by system owners and implemented by the security-responsible person. Maintain user identities and access rights in a central repository. Deploy cost-effective technical and procedural measures, and keep them current to establish user identification, implement authentication and enforce access rights.
User Account Management
User Account Management
Address requesting, establishing, issuing, suspending, modifying and closing user accounts and related user privileges with a set of user account management procedures. Include an approval procedure outlining the data or system owner granting the access privileges. These procedures should apply for all users, including administrators (privileged users) and internal and external users, for normal and emergency cases. Rights and obligations relative to access to enterprise systems and information should be contractually arranged for all types of users. Perform regular management review of all accounts and related privileges.
Security Testing, Surveillance and Monitoring
Security Testing, Surveillance and Monitoring
Test and monitor the IT security implementation in a proactive way. IT security should be reaccredited in a timely manner to ensure that the approved enterprise’s information security baseline is maintained. A logging and monitoring function will enable the early prevention and/or detection and subsequent timely reporting of unusual and/or abnormal activities that may need to be addressed.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Security Incident Definition
Security Incident Definition
Clearly define and communicate the characteristics of potential security incidents so they can be properly classified and treated by the incident and problem management process.
Protection of Security Technology
Protection of Security Technology
Make security-related technology resistant to tampering, and do not disclose security documentation unnecessarily.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Cryptographic Key Management
Cryptographic Key Management
Determine that policies and procedures are in place to organize the generation, change, revocation, destruction, distribution, certification, storage, entry, use and archiving of cryptographic keys to ensure the protection of keys against modification and unauthorized disclosure.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Malicious Software Prevention, Detection and Correction
Malicious Software Prevention, Detection and Correction
Put preventive, detective and corrective measures in place (especially up-to-date security patches and virus control) across the organization to protect information systems and technology from malware (e.g., viruses, worms, spyware, spam).
Network Security
Network Security
Use security techniques and related management procedures (e.g., firewalls, security appliances, network segmentation, intrusion detection) to authorize access and control information flows from and to networks.
Exchange of Sensitive Data
Exchange of Sensitive Data
Exchange sensitive transaction data only over a trusted path or medium with controls to provide authenticity of content, proof of submission, proof of receipt and non-repudiation of origin.
Identify and Allocate Costs
Identify and Allocate Costs
The need for a fair and equitable system of allocating IT costs to the business requires accurate measurement of IT costs and agreement with business users on fair allocation. This process includes building and operating a system to capture, allocate and report IT costs to the users of services. A fair system of allocation enables the business to make more informed decisions regarding the use of IT services.
Definition of Services
Definition of Services
Identify all IT costs, and map them to IT services to support a transparent cost model. IT services should be linked to business processes such that the business can identify associated service billing levels.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
IT Accounting
IT Accounting
Capture and allocate actual costs according to the enterprise cost model. Variances between forecasts and actual costs should be analyzed and reported on, in compliance with the enterprise’s financial measurement systems.
Cost Modeling and Charging
Cost Modeling and Charging
Establish and use an IT costing model based on the service definitions that support the calculation of chargeback rates per service. The IT cost model should ensure that charging for services is identifiable, measurable and predictable by users to encourage proper use of resources.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Cost Model Maintenance
Cost Model Maintenance
Regularly review and benchmark the appropriateness of the cost/recharge model to maintain its relevance and appropriateness to the evolving business and IT activities.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Educate and Train Users
Educate and Train Users
Effective education of all users of IT systems, including those within IT, requires identifying the training needs of each user group. In addition to identifying needs, this process includes defining and executing a strategy for effective training and measuring the results. An effective training program increases effective use of technology by reducing user errors, increasing productivity and increasing compliance with key controls, such as user security measures.
Identification of Education and Training Needs
Identification of Education and Training Needs
Establish and regularly update a curriculum for each target group of employees considering:
• Current and future business needs and strategy
• Value of information as an asset
• Organizational values (ethical values, control and security culture, etc.)
• Implementation of new IT infrastructure and software (i.e., packages, applications)
• Current and future skills, competence profiles, and certification and/or credentialing needs as well as required reaccreditation
• Delivery methods (e.g., classroom, web-based), target group size, accessibility and timing
Delivery of Training and Education
Delivery of Training and Education
Based on the identified education and training needs, identify target groups and their members, efficient delivery mechanisms, teachers, trainers, and mentors. Appoint trainers and organize timely training sessions. Record registration (including prerequisites), attendance and training session performance evaluations.
There are no PSGs published for this topic; however, the topic is under review for future PSGs |
Evaluation of Training Received
Evaluation of Training Received
Evaluate education and training content delivery upon completion for relevance, quality, effectiveness, the retention of knowledge, cost and value. The results of this evaluation should serve as input for future curriculum definition and the delivery of training sessions.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Manage Service Desk and Incidents
Manage Service Desk and Incidents
Timely and effective response to IT user queries and problems requires a well-designed and well-executed service desk and incident management process. This process includes setting up a service desk function with registration, incident escalation, trend and root cause analysis, and resolution. The business benefits include increased productivity through quick resolution of user queries. In addition, the business can address root causes (such as poor user training) through effective reporting.
Service Desk
Service Desk
Establish a service desk function, which is the user interface with IT, to register, communicate, dispatch and analyze all calls, reported incidents, service requests and information demands. There should be monitoring and escalation procedures based on agreed-upon service levels relative to the appropriate SLA that allow classification and prioritization of any reported issue as an incident, service request or information request. Measure end users’ satisfaction with the quality of the service desk and IT services.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Registration of Customer Queries
Registration of Customer Queries
Establish a function and system to allow logging and tracking of calls, incidents, service requests and information needs. It should work closely with such processes as incident management, problem management, change management, capacity management and availability management. Incidents should be classified according to a business and service priority and routed to the appropriate problem management team, where necessary. Customers should be kept informed of the status of their queries.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Incident Escalation
Incident Escalation
Establish service desk procedures, so incidents that cannot be resolved immediately are appropriately escalated according to limits defined in the SLA and, if appropriate, workarounds are provided. Ensure that incident ownership and life cycle monitoring remain with the service desk for user-based incidents, regardless which IT group is working on resolution activities.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Incident Closure
Incident Closure
Establish procedures for the timely monitoring of clearance of customer queries. When the incident has been resolved, ensure that the service desk records the resolution steps, and confirm that the action taken has been agreed to by the customer. Also record and report unresolved incidents (known errors and workarounds) to provide information for proper problem management.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Reporting and Trend Analysis
Reporting and Trend Analysis
Produce reports of service desk activity to enable management to measure service performance and service response times and to identify trends or recurring problems, so service can be continually improved.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Manage the Configuration
Manage the Configuration
Ensuring the integrity of hardware and software configurations requires the establishment and maintenance of an accurate and complete configuration repository. This process includes collecting initial configuration information, establishing baselines, verifying and auditing configuration information, and updating the configuration repository as needed. Effective configuration management facilitates greater system availability, minimizes production issues and resolves issues more quickly.
Configuration Repository and Baseline
Configuration Repository and Baseline
Establish a supporting tool and a central repository to contain all relevant information on configuration items. Monitor and record all assets and changes to assets. Maintain a baseline of configuration items for every system and service as a checkpoint to which to return after changes.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Identification and Maintenance of Configuration Items
Identification and Maintenance of Configuration Items
Establish configuration procedures to support management and logging of all changes to the configuration repository. Integrate these procedures with change management, incident management and problem management procedures.
There are no PSGs published for this topic; however, the topic is under review for future PSGs |
Configuration Integrity Review
Configuration Integrity Review
Periodically review the configuration data to verify and confirm the integrity of the current and historical configuration. Periodically review installed software against the policy for software usage to identify personal or unlicensed software or any software instances in excess of current license agreements. Report, act on and correct errors and deviations.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Manage Problems
Manage Problems
Effective problem management requires the identification and classification of problems, root cause analysis and resolution of problems. The problem management process also includes the formulation of recommendations for improvement, maintenance of problem records and review of the status of corrective actions. An effective problem management process maximizes system availability, improves service levels, reduces costs, and improves customer convenience and satisfaction.
Identification and Classification of Problems
Identification and Classification of Problems
Implement processes to report and classify problems that have been identified as part of incident management. The steps involved in problem classification are similar to the steps in classifying incidents; they are to determine category, impact, urgency and priority. Categorize problems as appropriate into related groups or domains (e.g., hardware, software, support software). These groups may match the organizational responsibilities of the user and customer base, and should be the basis for allocating problems to support staff.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Problem Tracking and Resolution
Problem Tracking and Resolution
Ensure that the problem management system provides for adequate audit trail facilities that allow tracking, analyzing and determining the root cause of all reported problems considering:
• All associated configuration items
• Outstanding problems and incidents
• Known and suspected errors
• Tracking of problem trends
Identify and initiate sustainable solutions addressing the root cause, raising change requests via the established change management process. Throughout the resolution process, problem management should obtain regular reports from change management on progress in resolving problems and errors. Problem management should monitor the continuing impact of problems and known errors on user services. In the event that this impact becomes severe, problem management should escalate the problem, perhaps referring it to an appropriate board to increase the priority of the (RFC or to implement an urgent change as appropriate. Monitor the progress of problem resolution against SLAs.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Problem Closure
Problem Closure
Put in place a procedure to close problem records either after confirmation of successful elimination of the known error or after agreement with the business on how to alternatively handle the problem.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Integration of Configuration, Incident and Problem Management
Integration of Configuration, Incident and Problem Management
Integrate the related processes of configuration, incident and problem management to ensure effective management of problems and enable improvements.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Manage Data
Manage Data
Effective data management requires identifying data requirements. The data management process also includes the establishment of effective procedures to manage the media library, backup and recovery of data, and proper disposal of media. Effective data management helps ensure the quality, timeliness and availability of business data.
Business Requirements for Data Management
Business Requirements for Data Management
Verify that all data expected for processing are received and processed completely, accurately and in a timely manner, and all output is delivered in accordance with business requirements. Support restart and reprocessing needs.
Storage and Retention Arrangements
Storage and Retention Arrangements
Define and implement procedures for effective and efficient data storage, retention and archiving to meet business objectives, the organization’s security policy and regulatory requirements.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Media Library Management System
Media Library Management System
Define and implement procedures to maintain an inventory of stored and archived media to ensure their usability and integrity.
Disposal
Disposal
Define and implement procedures to ensure that business requirements for protection of sensitive data and software are met when data and hardware are disposed or transferred.
Backup and Restoration
Backup and Restoration
Define and implement procedures for backup and restoration of systems, applications, data and documentation in line with business requirements and the continuity plan.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Security Requirements for Data Management
Security Requirements for Data Management
Define and implement policies and procedures to identify and apply security requirements applicable to the receipt, processing, storage and output of data to meet business objectives, the organization’s security policy and regulatory requirements.
Manage the Physical Environment
Manage the Physical Environment
Protection for computer equipment and personnel requires well-designed and well-managed physical facilities. The process of managing the physical environment includes defining the physical site requirements, selecting appropriate facilities, and designing effective processes for monitoring environmental factors and managing physical access. Effective management of the physical environment reduces business interruptions from damage to computer equipment and personnel.
Site Selection and Layout
Site Selection and Layout
Define and select the physical sites for IT equipment to support the technology strategy linked to the business strategy. The selection and design of the layout of a site should take into account the risk associated with natural and man-made disasters, while considering relevant laws and regulations, such as occupational health and safety regulations.
There are no PSGs published for this topic; however, the topic is under review for future PSGs |
Physical Security Measures
Physical Security Measures
Define and implement physical security measures in line with business requirements to secure the location and the physical assets. Physical security measures must be capable of effectively preventing, detecting and mitigating risks relating to theft, temperature, fire, smoke, water, vibration, terror, vandalism, power outages, chemicals or explosives.
Physical Access
Physical Access
Define and implement procedures to grant, limit and revoke access to premises, buildings and areas according to business needs, including emergencies. Access to premises, buildings and areas should be justified, authorized, logged and monitored. This should apply to all persons entering the premises, including staff, temporary staff, clients, vendors, visitors or any other third party.
Protection against Environment Factors
Protection against Environment Factors
Design and implement measures for protection against environmental factors. Install specialized equipment and devices to monitor and control the environment.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Physical Facilities Management
Physical Facilities Management
Manage facilities, including power and communications equipment, in line with laws and regulations, technical and business requirements, vendor specifications, and health and safety guidelines.
There are no PSGs published for this topic: however, the topic is under review for future PSGs.
Manage Operations
Manage Operations
Complete and accurate processing of data requires effective management of data processing procedures and diligent maintenance of hardware. This process includes defining operating policies and procedures for effective management of scheduled processing, protecting sensitive output, monitoring infrastructure performance and ensuring preventive maintenance of hardware. Effective operations management helps maintain data integrity and reduces business delays and IT operating costs.
Operations Procedures and Instructions
Operations Procedures and Instructions
Define, implement and maintain procedures for IT operations, ensuring that the operations staff members are familiar with all operations tasks relevant to them. Operational procedures should cover shift handover (formal handover of activity, status updates, operational problems, escalation procedures and reports on current responsibilities) to support agreed-upon service levels and ensure continuous operations.
Job Scheduling
Job Scheduling
Organize the scheduling of jobs, processes and tasks into the most efficient sequence, maximizing throughput and utilization to meet business requirements.
IT Infrastructure Monitoring
IT Infrastructure Monitoring
Define and implement procedures to monitor the IT infrastructure and related events. Ensure that sufficient chronological information is being stored in operations logs to enable the reconstruction, review and examination of the time sequences of operations and the other activities surrounding or supporting operations.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Sensitive Documents and Output Devices
Sensitive Documents and Output Devices
Establish appropriate physical safeguards, accounting practices and inventory management over sensitive IT assets, such as special forms, negotiable instruments, special purpose printers or security tokens.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Preventive Maintenance for Hardware
Preventive Maintenance for Hardware
Define and implement procedures to ensure timely maintenance of infrastructure to reduce the frequency and impact of failures or performance degradation.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Monitor and Evaluate
Monitor and Evaluate
All IT processes need to be regularly assessed over time for their quality and compliance with control requirements. This domain addresses performance management, monitoring of internal control, regulatory compliance and governance. It typically addresses the following management questions:
• Is IT’s performance measured to detect problems before it is too late?
• Does management ensure that internal controls are effective and efficient?
• Can IT performance be linked back to business goals?
• Are adequate confidentiality, integrity and availability controls in place for information security?
Monitor and Evaluate IT Performance
Monitor and Evaluate IT Performance
Effective IT performance management requires a monitoring process. This process includes defining relevant performance indicators, systematic and timely reporting of performance, and prompt acting upon deviations. Monitoring is needed to make sure that the right things are done and are in line with the set directions and policies.
Monitoring Approach
Monitoring Approach
Establish a general monitoring framework and approach to define the scope, methodology and process to be followed for measuring IT’s solution and service delivery, and monitor IT’s contribution to the business. Integrate the framework with the corporate performance management system.
Definition and Collection of Monitoring Data
Definition and Collection of Monitoring Data
Work with the business to define a balanced set of performance targets and have them approved by the business and other relevant stakeholders. Define benchmarks with which to compare the targets, and identify available data to be collected to measure the targets. Establish processes to collect timely and accurate data to report on progress against targets.
Monitoring Method
Monitoring Method
Deploy a performance monitoring method (e.g., balanced scorecard) that records targets; captures measurements; provides a succinct, all-around view of IT performance; and fits within the enterprise monitoring system.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Performance Assessment
Performance Assessment
Periodically review performance against targets, analyze the cause of any deviations, and initiate remedial action to address the underlying causes. At appropriate times, perform root cause analysis across deviations.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Board and Executive Reporting
Board and Executive Reporting
Develop senior management reports on IT’s contribution to the business, specifically in terms of the performance of the enterprise’s portfolio, IT-enabled investment programs, and the solution and service deliverable performance of individual programs. Include in status reports the extent to which planned objectives have been achieved, budgeted resources used, set performance targets met and identified risks mitigated. Anticipate senior management’s review by suggesting remedial actions for major deviations. Provide the report to senior management, and solicit feedback from management’s review.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Remedial Actions
Remedial Actions
Identify and initiate remedial actions based on performance monitoring, assessment and reporting. This includes follow-up of all monitoring, reporting and assessments through:
• Review, negotiation and establishment of management responses
• Assignment of responsibility for remediation
• Tracking of the results of actions committed.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Monitor and Evaluate Internal Control
Monitor and Evaluate Internal Control
Establishing an effective internal control program for IT requires a well-defined monitoring process. This process includes the monitoring and reporting of control exceptions, results of self-assessments and third-party reviews. A key benefit of internal control monitoring is to provide assurance regarding effective and efficient operations and compliance with applicable laws and regulations.
Monitoring of Internal Control Framework
Monitoring of Internal Control Framework
Continuously monitor, benchmark and improve the IT control environment and control framework to meet organizational objectives.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Supervisory Review
Supervisory Review
Monitor and evaluate the efficiency and effectiveness of internal IT managerial review controls.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Control Exceptions
Control Exceptions
Identify control exceptions, and analyze and identify their underlying root causes. Escalate control exceptions and report to stakeholders appropriately. Institute necessary corrective action.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Control Self-assessment
Control Self-assessment
Evaluate the completeness and effectiveness of management’s control over IT processes, policies and contracts through a continuing program of self-assessment.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Assurance of Internal Control
Assurance of Internal Control
Obtain, as needed, further assurance of the completeness and effectiveness of internal controls through third-party reviews.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Internal Control at Third Parties
Internal Control at Third Parties
Assess the status of external service providers’ internal controls. Confirm that external service providers comply with legal and regulatory requirements and contractual obligations.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Remedial Actions
Remedial Actions
Identify, initiate, track and implement remedial actions arising from control assessments and reporting.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Ensure Compliance with External Requirements
Ensure Compliance with External Requirements
Effective oversight of compliance requires the establishment of a review process to ensure compliance with laws, regulations and contractual requirements. This process includes identifying compliance requirements, optimizing and evaluating the response, obtaining assurance that the requirements have been complied with and, finally, integrating IT’s compliance reporting with the rest of the business.
Identification of External Legal, Regulatory and Contractual Compliance Requirements
Identification of External Legal, Regulatory and Contractual Compliance Requirements
Identify, on a continuous basis, local and international laws, regulations, and other external requirements that must be complied with for incorporation into the organization’s IT policies, standards, procedures and methodologies.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Optimization of Response to External Requirements
Optimization of Response to External Requirements
Review and adjust IT policies, standards, procedures and methodologies to ensure that legal, regulatory and contractual requirements are addressed and communicated.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Evaluation of Compliance with External Requirements
Evaluation of Compliance with External Requirements
Confirm compliance of IT policies, standards, procedures and methodologies with legal and regulatory requirements.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Positive Assurance of Compliance
Positive Assurance of Compliance
Obtain and report assurance of compliance and adherence to all internal policies derived from internal directives or external legal, regulatory or contractual requirements, confirming that any corrective actions to address any compliance gaps have been taken by the responsible process owner in a timely manner.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Integrated Reporting
Integrated Reporting
Integrate IT reporting on legal, regulatory and contractual requirements with similar output from other business functions.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Provide IT Governance
Provide IT Governance
Establishing an effective governance framework includes defining organizational structures, processes, leadership, roles and responsibilities to ensure that enterprise IT investments are aligned and delivered in accordance with enterprise strategies and objectives.
Establishment of an IT Governance Framework
Establishment of an IT Governance Framework
Define, establish and align the IT governance framework with the overall enterprise governance and control environment. Base the framework on a suitable IT process and control model and provide for unambiguous accountability and practices to avoid a breakdown in internal control and oversight. Confirm that the IT governance framework ensures compliance with laws and regulations and is aligned with, and confirms delivery of, the enterprise’s strategies and objectives. Report IT governance status
and issues.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Strategic Alignment
Strategic Alignment
Enable board and executive understanding of strategic IT issues, such as the role of IT, technology insights and capabilities. Ensure that there is a shared understanding between the business and IT regarding the potential contribution of IT to the business strategy. Work with the board and the established governance bodies, such as an IT strategy committee, to provide strategic direction to management relative to IT, ensuring that the strategy and objectives are cascaded into business units and IT functions, and that confidence and trust are developed between the business and IT. Enable the alignment of IT to the business in strategy and operations, encouraging co-responsibility between the business and IT for making strategic decisions and obtaining benefits from IT-enabled investments.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Value Delivery
Value Delivery
Manage IT-enabled investment programs and other IT assets and services to ensure that they deliver the greatest possible value in supporting the enterprise’s strategy and objectives. Ensure that the expected business outcomes of IT-enabled investments and the full scope of effort required to achieve those outcomes are understood; that comprehensive and consistent business cases are created and approved by stakeholders; that assets and investments are managed throughout their economic life cycle; and that there is active management of the realization of benefits, such as contribution to new services, efficiency gains and improved responsiveness to customer demands. Enforce a disciplined approach to portfolio, program and project management, insisting that the business takes ownership of all IT-enabled investments and IT ensures optimization of the costs of delivering IT capabilities and services.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Resource Management
Resource Management
Oversee the investment, use and allocation of IT resources through regular assessments of IT initiatives and operations to ensure appropriate resourcing and alignment with current and future strategic objectives and business imperatives.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Risk Management
Risk Management
Work with the board to define the enterprise’s appetite for IT risk, and obtain reasonable assurance that IT risk management practices are appropriate to ensure that the actual IT risk does not exceed the board’s risk appetite. Embed risk management responsibilities into the organization, ensuring that the business and IT regularly assess and report IT-related risks and their impact and that the enterprise’s IT risk position is transparent to all stakeholders.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Performance Measurement
Performance Measurement
Confirm that agreed-upon IT objectives have been met or exceeded, or that progress toward IT goals meets expectations. Where agreed-upon objectives have been missed or progress is not as expected, review management’s remedial action. Report to the board relevant portfolios, program and IT performance, supported by reports to enable senior management to review the enterprise’s progress toward identified goals.
There are no PSGs published for this topic; however, the topic is under review for future PSGs
Independent Assurance
Independent Assurance
Obtain independent assurance (internal or external) about the conformance of IT with relevant laws and regulations; the organization’s policies, standards and procedures; generally accepted practices; and the effective and efficient performance of IT.