Core IT Security
Process Assessment

Challenges

Client’s core operational processes needed to be reviewed and enhanced, to cope with the latest security requirements based on the group guidelines.
 
  • Multiple asset tracking/discovery and Identity Access Management tools in place but the underlying processes to extract relevant information were missing.
  • Too many manual activities with high dependency on specific individuals delaying the activities during execution.
  • Multiple teams with lack of governance controls to define roles and responsibilities.

Synergy Solution

The ‘As-Is Processes’ were re-established as per the group guidelines and industry standards.

Roles and responsibilities, with clear RACI matrix, were defined for all the processes.

A detailed ‘maturity scorecard’ presented for all the operational processes based on industry benchmarks.

Automated the Vulnerability and Threat alert services and removed any human intervention in the ticketing process.