Enterprise Security Management

Header Image
Project:
Enterprise Security Management : Public <<TMF_Process>> eTOM Process
Created: 6/28/2022 5:38:25 PM
Modified: 1/16/2025 11:26:34 AM
Project:
Advanced:
Security Management processes assess threats to the enterprise and provide capabilities and controls to minimize the threats identified. These processes are responsible for setting Security Management corporate policies, guidelines, best practices and auditing for compliance by the enterprise.  In the information and communications technology (ICT) service provider domain, Security Management is a systematic and continuous series of processes and behaviors which assure the confidentiality, availability, and integrity of the Enterprise’s critical ICT assets. For ICT service providers, such assets can also include customer and partner data and resources.  Effective Security Management is essential for an ICT service provider to meet its fiduciary and legal obligations, business/mission objectives, and customer expectations.  Security Management addresses both internal and external sources of security threats as it provides computer network protection and defensive services.  Security Management processes include:1) Prevention;  2) Monitoring ; 3) Analysis; 4) Detection 5) Incident Management.<br/><br/>Security management deals with enterprise exposure to loss of value or reputation through threats or security violations.  Proactive Security Management processes identify areas of threat to the enterprise (covering both internal and external sources of threat), and monitor industry trends and best practice approaches to ensure that the enterprise remains at the forefront of security management threat minimization. Areas of threat can be physical (e.g. break-ins or terrorist incident, inappropriate use of network) or logical (e.g. inappropriate access to and use of information technology). The processes support the categorization and prioritization of areas of threat. These processes define the policies, guidelines, practices and procedures to be followed and provide assistance to the enterprise operational areas to deploy appropriate physical infrastructure, procedures and monitoring capabilities.  Reactive Security management processes deal with the establishment of tools and data collection capabilities to capture details of operation activity, analysis of monitored activity to detect potential threats/security violations, and forensic investigations to determine whether the potential threat is imminent or a security violation has occurred, and the potential or actual perpetrators.<br/><br/>Security Management processes interface to external security, police and/or investigative organizations.  These processes strongly interact with Fraud Management and have common elements and information services and communications specific elements.   Security Management processes are implemented at many levels of the enterprise and at the user, system/network, etc. levels.  Note that the actual security monitoring, control and management procedures and facilities are embedded in the operational infrastructure and processes defined and deployed within the SIP and Operations process areas.  Note that Audit Management processes provide assurance that the necessary control structures are in place, and provide an estimate to the extent to which the procedures are followed and are effective.<br/>
  • Associations To
  • Associations From
  • Tagged Values
  • Advanced
Element Source Role Target Role
«TMF_Domain» Enterprise Domain
Domain «TMF_DomainAggregatesProcess»
Name:  
 
Name:  
 
Details:
 
Element Source Role Target Role
«TMF_Process» Detect Potential Security Threats & Violations
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Define Security Management Analysis
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Monitor Industry Trends for Security Management
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Investigate Potential Security Threats & Violations
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Define Security Management Policies & Procedures
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Define Security Management policies & procedures to facilitate detection incidents
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Manage Proactive Security Management
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Assist with Security Management Deployment
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Define Security Management Prevention
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Manage Reactive Security Management
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Define Incident Management policies and procedures
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
«TMF_Process» Define Monitoring to Facilitate Security Management
eTOM Process «TMF_isComposedByProcess»
Name:  
 
Name:  
 
Details:
 
Tag Value
BriefDescription Security Management processes assess threats to the enterprise and provide capabilities and controls to minimize the threats identified. These processes are responsible for setting Security Management corporate policies, guidelines, best practices and auditing for compliance by the enterprise. 
Details:  
HierarchyLevel 2
Details:
Description: the level of this object in the hierarchy (1-x integer)
Issue Application Framework 16.5 Modification
Business Process Framework 12.0 Modification
Business Process Framework 15.0 Modification
Business Process Framework 15.5 Modification
Business Process Framework 21.5 Modification
eHealth View
Details:  
Maturity 4
Details:
Description: the maturity level of this element  (1-x integer)
Original Process Identifier 1.3.2.2
Details:  
Process Identifier 1.7.11
Details:  
TMFStatus Released
Details:
Values: Released,Preliminary,Draft,Not Fully Developed,likelyToChange,likelyToBeDeprecated
Description: the TM Forum status
UID 00256
Details:
Description: Unique Process ID
Property Value
isFinalSpecialization: 0