Level 1 – phase B

In phase B, we as an organization starting to look at how they can align the policies of the specific item that needs to be monitored. We can use the F3EAD process to target the gaps of information or issues in communication to stakeholders. Once we understand the issues, we can begin developing the policies to put into place that will drive the establishment of OLAs between teams and SLAs between the organization and the service provider. 

By establishing the policies for the item to be monitored, it formalizes the collaboration between IT operations and IT security on a specific topic. Now that the what/why needs to be monitored has been established, the how it needs to be monitored.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.191.202.240