IT Operations - Document Operating Procedures
IT Operations - Document Operating Procedures
IT Operations
ISMS/DOP/001
Documented Operating
Procedures
Completion of the following signature blocks signifies the review and approval of this Process
2. Change History
3. Contents
2. Change History........................................................................................................ 1
3. Contents...................................................................................................................2
5. Document Referred..................................................................................................3
7. Document Control....................................................................................................5
8 Securitry of Documentation....................................................................................5
Process
Following steps are taken to identify and document the control objectives and security controls in the
Information Security Policy approved by senior management:
7. Document control
Objective
To ensure that documents in use in connection with ISMS project are controlled in a systematic
manner.
Responsibilities
The IT Operations manager shall ensure that all ISMS project documents are controlled and that
proper records are maintained
Process
Copies of all outgoing and incoming mail of all correspondence shall be retained in
the project file(s)
The circulation of all correspondence shall be annotated as being, confidential, for
information, action or discussion
Individual IT staff may maintain working files but these should not retain original
documents.
3. controlled documents shall be clearly identified according to this procedure and recorded.
Use of non-controlled documents shall be strictly limited.
4. All reports, logs, forms and procedures created by the IT Operations shall be signed and
controlled in accordance with this procedure
Process
This procedure covers the identification, logging and preparation of records for submission to central
archive.
All paper records related to the ISMS shall be kept in a fire safe and will be available for inspection
upon request from IT Operations manager.
All electronic records related to the ISMS will be available on the Trust’s network server in a secure
folder with READ ONLY access
A second copy of documents related to the ISMS will be available on a CD as a backup and will be
kept off site
Uncontrolled copies of documents relating to information security management will be available on the
Trust’s Intranet to authorised users
Documents shall be registered and be retained for not less than 3 years
Where records have been reviewed and subsequently destroyed, this shall be noted in a register held
by IT operations
Helpdesk
Procedures
Information
Security Risk
Assessment
Statement of
Applicability
IT Security
Audit Plans
and Records
Audit Strategy
Including Security
in Job
Responsibilities
Equipment Siting
and Protection
Policy on Use of
Network Services
Mobile Computing
Teleworking
Incident
Management
Procedures
Access Control
Policy
Privilege
Management
Security of
Equipment Off-
premises
Enforced Path
Network Routing
Control
Equipment
Maintenance
Security of Network
Services
Facility Manager
Helpdesk Manager
Infrastructure Manager