mirror of
https://github.com/fleetdm/fleet
synced 2026-05-22 16:39:01 +00:00
Updating DRIs (#38245)
<!-- Add the related story/sub-task/bug number, like Resolves #123, or remove if NA --> **Related issue:** Resolves https://github.com/fleetdm/confidential/issues/11074 This pull request updates the security roles and responsibilities section in the `handbook/finance/security.md` file. The main change is the reassignment and consolidation of responsibilities related to information security oversight and third-party risk management. **Updates to security roles and responsibilities:** * The `Head of Security` role has been replaced with the `Head of IT`, who now assumes all previous responsibilities of the Head of Security, with the addition of explicit oversight over third-party risk management and vendor service contract reviews. * The separate `Head of Digital Workplace & GTM Systems` role, previously responsible for third-party risk management and vendor contract review, has been removed, consolidating these responsibilities under the `Head of IT`.
This commit is contained in:
parent
316adb4cd0
commit
3fc24fb1e8
1 changed files with 2 additions and 2 deletions
|
|
@ -1613,11 +1613,11 @@ Fleet Device Management is committed to conducting business in compliance with a
|
|||
| Board of directors | Oversight over risk and internal control for information security, privacy, and compliance<br/> Consults with executive leadership to understand Fleet's security mission and risks and provides guidance to bring them into alignment |
|
||||
| Executive leadership | Approves capital expenditures for information security<br/> Oversight over the execution of the information security risk management program<br/> Communication path to Fleet's board of directors. Meets with the board regularly, including at least one official meeting a year<br/> Aligns information security policy and posture based on Fleet's mission, strategic objectives, and risk appetite |
|
||||
CTO | Oversight over information security in the software development process<br/> Responsible for the design, development, implementation, operation, maintenance and monitoring of development and commercial cloud hosting security controls<br/> Responsible for oversight over policy development <br/>Responsible for implementing risk management in the development process |
|
||||
| Head of Security | Oversight over the implementation of information security controls for infrastructure and IT processes<br/> Responsible for the design, development, implementation, operation, maintenance, and monitoring of IT security controls<br/> Communicate information security risks to executive leadership<br/> Report information security risks annually to Fleet's leadership and gains approvals to bring risks to acceptable levels<br/> Coordinate the development and maintenance of information security policies and standards<br/> Work with applicable executive leadership to establish an information security framework and awareness program<br/> Serve as liaison to the board of directors, law enforcement and legal department.<br/> Oversight over identity management and access control processes |
|
||||
| Head of IT | Oversight over the implementation of information security controls for infrastructure and IT processes<br/> Responsible for the design, development, implementation, operation, maintenance, and monitoring of IT security controls<br/> Communicate information security risks to executive leadership<br/> Report information security risks annually to Fleet's leadership and gains approvals to bring risks to acceptable levels<br/> Coordinate the development and maintenance of information security policies and standards<br/> Work with applicable executive leadership to establish an information security framework and awareness program<br/> Serve as liaison to the board of directors, law enforcement and legal department.<br/> Oversight over identity management and access control processes.</br> Responsible for oversight over third-party risk management process and review of vendor service contracts |
|
||||
| System owners | Manage the confidentiality, integrity, and availability of the information systems for which they are responsible in compliance with Fleet policies on information security and privacy.<br/> Approve of technical access and change requests for non-standard access |
|
||||
| Employees, contractors, temporary workers, etc. | Acting at all times in a manner that does not place at risk the security of themselves, colleagues, and the information and resources they have use of<br/> Helping to identify areas where risk management practices should be adopted<br/> Adhering to company policies and standards of conduct Reporting incidents and observed anomalies or weaknesses |
|
||||
| Head of People Operations | Ensuring employees and contractors are qualified and competent for their roles<br/> Ensuring appropriate testing and background checks are completed<br/> Ensuring that employees and relevant contractors are presented with company policies <br/> Ensuring that employee performance and adherence to values is evaluated<br/> Ensuring that employees receive appropriate security training |
|
||||
| Head of Digital Workplace & GTM Systems | Responsible for oversight over third-party risk management process; responsible for review of vendor service contracts |
|
||||
|
||||
## Network and system hardening standards
|
||||
|
||||
Fleet leverages industry best practices for network hardening, which involves implementing a layered defense strategy called defense in depth. This approach ensures multiple security controls protect data and systems from internal and external threats.
|
||||
|
|
|
|||
Loading…
Reference in a new issue