- How to Use This Catalog
- Form and Content of Process Catalog Entries
- Application Optimization
- Asset Management
- Budget Management
- Business Continuity
- Business Relationship Management
- Capacity Planning
- Change Management
- Configuration Management
- Contract Management
- Contractor Management
- Cost Recovery
- Data Storage Management
- Facilities Management
- Inventory Management
- Job Scheduling
- Negotiation Management
- Network Management
- Output Management
- Performance Management
- Problem Management
- Production Acceptance
- Production Control
- Physical Database Management
- Quality Assurance
- Security Management
- Service-Level Management
- Service Request Management
- Software Distribution
- System Monitoring
- Tape Management
- Workload Monitoring
Security Management
This process aims to assure IT security by granting and enforcing the appropriate level of access to applications and data to internal and external personnel through the use of day-to-day administration of security policies and the use of a consistent security policy across all enterprise resources.
|
|
Tasks |
Skills |
|
|
Staffing |
Automation Technology |
|
|
Best Practices |
Metrics |
|
|
Process Integration |
Futures |
|
|