Corporate Audit of Security
Final Summary Report
5.2 MANAGEMENT RESPONSE
AND ACTION PLAN (2 of 3)
| Recommendations | Response | Action Plan and Tasks | Responsibility | Target Dates |
|---|---|---|---|---|
|
2. The management framework for security should be more integrated between NHQ, the regions and sites to ensure the effective implementation of policies and procedures. Senior management should strengthen the security framework by: 2.1 Ensuring that policy development is improved and that the draft policy is promulgated - this would include promulgation of the IT Security policy, cleaning up or replacing existing intranet sites, and coordinating policy between security elements; 2.2 Ensuring that all responsible organizations develop a plan outlining security objectives and time frames, including improved training; 2.3 Establishing joint security committees (regional/national, regional/regional, security/business) and record proceedings to share information, action taken, results and “best” security practices. |
CIC agrees that a set of common, clear,
comprehensive, communicated and current policies is key to an effective
security program. Policies already exist, but awareness and understanding
of these policies still need to increase across the organization.
Treasury Board is in the process of revising the standards associated with the revised GSP. CIC will integrate and complete its security policy so that it can adapt to changes in federal government security policies. CIC will incorporate an appropriate level of security into regular business operations. Staff will work within the parameters of the GSP in the same way that they currently do within those established by the Financial Management Act or the Public Service Staff Relations Act. |
2.1 Ensuring that policy development is improved,
and that draft policy is promulgated - this would include promulgation
of the IT Security Policy, cleaning up or replacing existing Intranet
sites, and coordinating policy between security elements
a) Integration Citizenship and Immigration security policy will be revised to meet the demands of the new GSP and its evolving standards documents. CIC will harmonize all security policy - current status, target state, gap analysis and migration plan - and integrate it within the GSP. |
|
|
| b) IT Security Policy and Review
The Information Management and Technologies Branch completed a security policy review on June 28, 2002, and addressed several issues identified in the audit, including:
Revising policy, procedures, governance structure and transition plans |
|
|
||
|
The resulting recommendations include the following projects and activities to improve the security of the Department.
|
||||
| 2.2 Ensuring that all responsible organizations
develop a plan outlining security objectives and time frames, including
improved training
a) Security Awareness Program The revised GSP requires departments to set up
a security awareness program. |
|
|
||
| 2.3 Establishing joint committees (regional/national,
regional/regional, security/business) and record proceedings to share
information, action taken, results and “best” security
practices
a) Joint Committees |
|
|
||
| b) Incident reporting system A system has been developed to capture data on incidents. Reports and trend analyses for offices and regions are available, as well as from a national roll-up perspective. |
|
|
- Date Modified:
