Manage Data Center Operations: Security RCM

Subscriber Content
Preview Image
Image
screenshot of the first page of Manage Data Center Operations Security RCM

Strengthen Internal Controls and Safeguard Data Center Operations

A successful risk management strategy requires a strong internal control environment. The risk control matrix (RCM) format emphasizes that strong and risk-oriented internal control environments are often optimized with automated/manual controls, depending on the situation.  

An RCM provides an overview of different control objectives that organizations should take into consideration and the corresponding controls to safeguard the company against risks, which may arise if not checked timely. Once customized to an organization, this document can help the user in assessing each control. The control assessment can then also be summarized to develop an action plan.  

This document outlines risks and controls common to the 4.4.1 Mange Data Center Operations: Security process in a risk control matrix (RCM) format.  

Sample risks include:  

  • Access to the data center may not properly prevent inappropriate and/or unauthorized access. 
  • Adequate physical control measures may not be in place to properly protect the data center environment. 
  • Deviations from scheduled processes, such as interfaces, batch processing and real-time processing, are not detected, escalated or resolved. 
  • Erroneous changes could be made to the production environment if documentation supporting the change request is inadequate or missing. 

This document can be used as a sample RCM and is not meant to be an exhaustive list of risks and controls. The KnowledgeLeader team will periodically update this RCM with new content. Organizations should select, update and modify the risks and controls included in this document to ensure that it reflects business operations.