1 / 7

Security Awareness Training: System Administrator

lane
Download Presentation

Security Awareness Training: System Administrator

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Security Awareness Training: System Administrator

    2. Definition The System Administrator is an analyst, engineer, or consultant who implements, manages, and/or operates a system or systems at the direction of the System Owner, Data Owner, and/or Data Custodian. The System Administrator assists agency management in the day-to-day administration of agency IT systems, and implements security controls and other requirements of the agency information security program on IT systems for which the System Administrator has been assigned responsibility. The System Administrator is an analyst, engineer, or consultant who implements, manages, and/or operates a system or systems at the direction of the System Owner, Data Owner, and/or Data Custodian. The System Administrator assists agency management in the day-to-day administration of agency IT systems, and implements security controls and other requirements of the agency information security program on IT systems for which the System Administrator has been assigned responsibility.

    3. Communication Communicate with Data and System Owners Implementing their request Supporting their mission Business Continuity Create documentation Reports and Monitoring Communicate with Data and System Owners Implementing their request Supporting their mission Business Continuity Create documentation Reports and Monitoring

    4. Security Have a separate regular account and admin account Report and Investigate Breaches/Incidents Ensure adherence to policies and regulations Design procedures Data Disposal Implement as designated Access controls Encryption Remote Access Patch and address security issues and reports Logging System hardening Baseline Security for all systems Additional security for sensitive systems Have a separate regular account and admin account Report and Investigate Breaches/Incidents Ensure adherence to policies and regulations Design procedures Data Disposal Implement as designated Access controls Encryption Remote Access Patch and address security issues and reports Logging System hardening Baseline Security for all systems Additional security for sensitive systems

    5. Risk Management & Business Continuity Perform Backup and restore Recovery/COOP Create and use Testing EnvironmentsPerform Backup and restore Recovery/COOP Create and use Testing Environments

    6. System Interoperability Assist data Owner: Document Systems with shared data Type Data flow Contact info Written agreement with security requirements Specify how data is stored System Owner agrees to abide by legal requirements System Owner’s authority to approve access Approve and enforce Inform others who share the system or data to include new shares Assist data Owner: Document Systems with shared data Type Data flow Contact info Written agreement with security requirements Specify how data is stored System Owner agrees to abide by legal requirements System Owner’s authority to approve access Approve and enforce Inform others who share the system or data to include new shares

    7. Other Security Considerations Phishing/Social Engineering Passwords/Passphrases Systems that don’t meet requirements need exception Phishing/Social Engineering Passwords/Passphrases Systems that don’t meet requirements need exception

More Related