Service Management Practice and Cyber Security Practice Controls
Across
- 2. Cyber incidents are ___________, prioritised, escalated and recorded as per incident response plans, with actions implemented to contain the incident in a timely manner
- 5. System End of Service Management requires IT systems to have defined __________ management procedures in place
- 6. A change record must be ____________ before a change is implemented
- 10. System change management controls are essential to ensure changes to the production environment do not compromise the ______________ of the environment or the confidentiality or integrity of the data stored in the environment
- 12. IT Service _________ processes are in place to ensure the availability and integrity of Customer and Business data and production systems in the event of a disaster or a major IT incident
- 13. An _____________ change is the only change type that can be logged retrospectively
Down
- 1. Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
- 3. IT _______ and self-identified problems requiring root cause identification and permanent corrective action are recorded, analysed, and resolved in a timely manner
- 4. To prevent inappropriate _____ to IT systems and services roles are managed through their lifecycle in accordance with our standards and requirements
- 7. The network is segmented into security zones to ______ IT services and information assets from unauthorised access
- 8. The peer _____ process is the task that authorises a standard change to proceed
- 9. Any change made in production must be ______ to ensure visibility of the change
- 11. Data ____ protection tools identify and prevent inappropriate data transfers and prevent the leakage of confidential information