Service Management Practice and Cyber Security Practice Controls

12345678910111213
Across
  1. 2. Cyber incidents are ___________, prioritised, escalated and recorded as per incident response plans, with actions implemented to contain the incident in a timely manner
  2. 5. System End of Service Management requires IT systems to have defined __________ management procedures in place
  3. 6. A change record must be ____________ before a change is implemented
  4. 10. System change management controls are essential to ensure changes to the production environment do not compromise the ______________ of the environment or the confidentiality or integrity of the data stored in the environment
  5. 12. IT Service _________ processes are in place to ensure the availability and integrity of Customer and Business data and production systems in the event of a disaster or a major IT incident
  6. 13. An _____________ change is the only change type that can be logged retrospectively
Down
  1. 1. Network traffic is inspected to identify behavioural anomalies in order to prevent or _______ a compromise to the IT environment and information assets
  2. 3. IT _______ and self-identified problems requiring root cause identification and permanent corrective action are recorded, analysed, and resolved in a timely manner
  3. 4. To prevent inappropriate _____ to IT systems and services roles are managed through their lifecycle in accordance with our standards and requirements
  4. 7. The network is segmented into security zones to ______ IT services and information assets from unauthorised access
  5. 8. The peer _____ process is the task that authorises a standard change to proceed
  6. 9. Any change made in production must be ______ to ensure visibility of the change
  7. 11. Data ____ protection tools identify and prevent inappropriate data transfers and prevent the leakage of confidential information