How & Why
Security Evaluation of Business Processes
Most business processes are supported by information and telecommunication systems. IT-Security must be a part of them. In these processes there are “mission critical” assets and flows of information.
- Analysis of „mission critical“ assets, data and framework: The goals of security – Confidentiality-Integrity-Availability - depend on the business model. Different departments in an enterprise also have different requirements.
- Check for legal or formal requirements: We describe legal or formal requirements (e.g. SOX, GmbHG) and show the impact for business and IT–Security. One of them could be a stringent logging system und process.
- Build up or optimize risk management incl. methods and tools.
- Business Continuity: Prepare for „worst case“ scenarios with a major impact on business goals.