The ProtectIT Application aims to show the Compliance/Risk Analyst and Business Application Owner how high their protection need is. The process involves conducting a Business Impact Analysis to assess the availability target on the Business Process and determining the Authenticity-, Integrity-, and Confidentiality Targets on the Information Object level.
These targets are used for the secured traceability and determination of the protection needs and will be inherited from the Information Object, in the related Business Processes and Business Applications. This process will be automated by conducting a Business Impact Analysis which includes an automated calculation and an Inheritance and Recalibration process of the values.
- Conduct Business Impact Analysis via ServiceNow Assessment Engine
- Measure and track Confidentiality, Authenticity, Availability and Integrity of CIs
- Automated Calculation of Availability targets against Business Processes
- Recalibration and Inheritance engine to apply CIAAU targets to related CIs
Initial release of the ProtectIT Application which includes:
-
Determination of CIAAU Targets
-
Conducting a Business Impact Analysis on Business Processes.
-
Inheritance and Recalibration of the CIAAU Targets.
-
Business Impact Analysis Review.
-
Dashboards / Reports.
Configuration Management Database (CMDB)
ServiceNow Assessment Engine
Flow Designer