Search icon
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Microsoft System Center 2012 R2 Compliance Management Cookbook
Microsoft System Center 2012 R2 Compliance Management Cookbook

Microsoft System Center 2012 R2 Compliance Management Cookbook: Over 40 practical recipes that will help you plan, build, implement, and enhance IT compliance policies using Microsoft Security Compliance Manager and Microsoft System Center 2012 R2

£32.99 £22.99
Book Oct 2014 284 pages 1st Edition
eBook
£32.99 £22.99
Print
£41.99
Subscription
£13.99 Monthly
eBook
£32.99 £22.99
Print
£41.99
Subscription
£13.99 Monthly

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Oct 31, 2014
Length 284 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781782171706
Vendor :
Microsoft
Table of content icon View table of contents Preview book icon Preview Book

Microsoft System Center 2012 R2 Compliance Management Cookbook

Chapter 1. Starting the Compliance Process for Small Businesses

This chapter covers the initial planning tasks to be worked through before you start with your compliance program. The recipes for this chapter are as follows:

  • Planning the scope of the basic compliance program

  • Understanding possible controls for compliance

  • Evaluating the efforts of controls

  • Bringing it all together into a basic compliance program

Introduction


All companies must adhere to regulatory requirements and as such, require a compliance program. For example, when a company trades, it must adhere to its local tax requirements; even a small company must have certain controls in place to ensure it remains compliant. Also, if a company accepts credit card payments, it must have controls in place to ensure it is compliant with the Payment Card Industry Data Security Standard (PCI DSS).

When creating a compliance program, it makes sense to develop processes that will benefit the business. For example, having good controls in place will simplify the audit process, lower insurance premiums, or simply protect against fines.

The purpose of the following recipes is to help you identify and plan a compliance program using System Center in conjunction with other Microsoft technologies. The examples are provided throughout the book, demonstrating how they will benefit your company.

This chapter identifies and defines the first steps in your compliance process based on regulatory standards or similar requirements and how they relate to business objectives. It provides information on how to address compliance requirements with the help of controls. It offers advice on how to interpret authority documents to extract those controls. The book specifically focuses on technical controls.

Planning the scope of a basic compliance program


Scoping is one of the keys to a successful compliance program. Irrespective of company size, you have to decide what to include and what to leave out. When scoping the requirements, take into account all the relevant business, legal, regulatory, and contractual compliance requirements. Requirements will vary from industry to industry and from country to country. Most countries have business accelerators or government agencies providing free advice; make the most of any available service to collect information for your compliance program.

Getting ready

To determine compliance requirements, different information sources can be included to assist program development during the scope-definition phase. The following list provides some potential resources:

  • Company resources: They can include the company lawyer and internal stakeholders, such as business unit managers from the Human Resources, Finance, Operations, and Information Technology departments; they should know regulatory and contractual compliance requirements for their specific areas.

  • External resources: They include the following:

    • Private organizations: This may include the Financial Accounting Standards Board, the IT Compliance Institute, or the IT Governance Institute that offer advice and information.

    • National organizations: They represent the industry interests and/or legal structures of a company

  • Internet resources: Generally, they will be specific to each country; the following are some examples:

How to do it...

In order to define a scope, the following steps have to be taken:

  • Understand your business compliance requirements and focus on the most critical business processes. Ask yourself the question: What is the primary product or service the business offers? Understand what is relevant to achieve any process or deliver products and/or services, for example, business units, people, applications, systems, data, and devices.

  • Research the regulatory, contractual, and internal requirements using external resources and internal stakeholders.

Based on the information collected, define your in scope and out of scope objectives.

How it works...

There are two aspects to scope definition. The first aspect is, "What company assets should you include?" The second aspect is, "Which regulatory requirements or standards to include in your compliance program?"

Scope definition defined by the business

From a company perspective, the scope definition will include assets, such as physical locations, business units, equipment, application systems, and so on.

For a small or medium-sized company, defining a scope based on the compliance requirements shouldn't be a problem. Most likely, everything has to be included because data of critical applications are directly used in day-to-day business operations. In this case, separating your in scope part of the company and the out of scope part of the company might prove impossible or impractical.

Many smaller companies view compliance as a daunting task and don't start it at all. To avoid this problem, a phased approach is possible. The only consideration for a successful execution of this approach is the ability to define a self-contained scope. The benefit is that results from the first step can be incorporated into the next phase to improve on the compliance process.

For larger or more complex businesses, your decision as to what to include should be based on the following considerations:

  • Physical scope: This includes locations or business units that have to adhere to compliance obligations.

  • Logical scope: This includes all networks, application systems, data, and devices up to endpoint devices that use/process data that are part of the compliance obligation.

In addition, avoid situations where business units, applications, systems, or devices are both in scope and out of scope, because these could lead to breaches in your compliance program. For example, if some users are processing transaction data within an application but have limited privileges, they may be considered out of scope, whereas the IT administrator may have privileges to change data and that needs to be in scope.

That means that physical or logical separation must be possible.

Scope definition defined by regulatory, standard, contractual, or internal requirements

The other question that has to be answered for scope definition is, "What requirements have to be met in order to be compliant?"

Questions that should be asked are as follows:

  • What are the basic regulatory, standard, or contractual requirements that have to be met? (This will determine which authority documents to focus on as a priority.)

  • Which regulatory or standard requirements create a high risk for the business in the event of a failure?

The first question is based on the size and legal structure of a business and the industry the company is based in. The following list provides three examples of compliance areas that have to be considered:

  • Tax compliance: Regardless of the business size, tax compliance starts with creating the business and complies with controls used in most countries that demand registration of your business and regular tax declarations. These controls will include the creation of orders and invoices that show relative tax information and the recording of payments.

  • Accounting compliance: Just as before, regardless of size, most countries have regulatory or standard requirements demanding integrity or accuracy displayed in an annual financial statement, where the type and content depend on the size and legal structure of your company.

  • IT compliance: As with contractual requirements, these can be in the form of software license compliance or regulatory requirements, such as data protection.

As an example of IT data protection compliance, let's look at the example from the preface, where we talked about the purchase process and systems holding customer and purchase information. To most companies, the business process that requires this information or data will be critical. Therefore, it should be considered for in scope.

The next question that has to be answered is, "Which regulatory, standard, contractual, or internal requirements must be met?" Data protection laws are one of those basic requirements focusing on protection of the personal data held on individuals. The financial information you hold on your customers, such as their identity information, credit card, or bank information, will fall under this category. Data protection laws vary from country to country; however, they all focus on protecting the data. Ensure that you review the respective laws; information on these laws is generally available and is easy to understand. For example, the authority document of the German protection law Bundesdatenschutzgesetz (BDSG) makes it fairly easy to understand the scope as it states in Appendix to §9 paragraph 1:

  1. Prevent unauthorized access to data processing systems that process or use personalized information (physical access control)

  2. Prevent unauthorized usage of data processing systems (access control)

Based on those two requirements, all locations (or just rooms), applications, networks, and devices that process, transmit, or store that information should be in scope.

The Payment Card Industry Data Security Standard (PCI DSS) is an example of high risk for businesses that accept, process, transmit, or store credit card data. In the event of failure in complying with PCI DSS, credit card companies, such as Visa, American Express, or MasterCard, may revoke the right to process credit card data. This could prove fatal for businesses relying on credit card payments from their customers. For those businesses, PCI DSS will definitely be in scope for fulfillment of an authority document.

An example on how to start with scope definition

Creating a network or architecture map is a great help in order to decide what to include to fulfill the BDSG or PCI DSS requirements. Even if you include everything in your scope, it is important to understand the relationship between your application systems, data flow, and connection points to the outside, meaning everything that is beyond your company network (for example, Internet connections). As shown in the previous example, regulatory requirements focus on specific areas. The data protection laws define certain requirements that have to be met by people (user accounts), applications, systems, and devices that handle the data. You can limit the scope of those requirements to only the relevant systems, devices, or business units.

Using a phased approach, you can start simple and then add details as you move forward with your compliance program. After the initial creation, start adding details of the systems in the network map. An important piece of information is the application used (for example, Exchange), the operating system, and the data flow of your in-scope application systems.

There's more...

You can use a degree of automation to create a network map. System Center Operations Manager is one of the tools that will help to create such a map. This will ensure that an automated diagram of your network and device landscape is created in an efficient and time-saving manner. In addition, this provides dynamic updating of your network map.

System Center Operations Manager offers different views. The Network Vicinity Dashboard view shows the relationship between network devices and computer (Windows Server) systems. It is a good starting point for a network map.

To view the Network Vicinity Dashboard, perform the following steps:

  1. Open System Center 2012 R2 Operations Manager console.

  2. Select the Monitoring workspace.

  3. Expand the Network Monitoring folder.

  4. Choose the device class you want to see; here, we choose Network Devices.

  5. Go to the Tasks pane and click on Network Vicinity Dashboard.

  6. The dashboard opens. Select Show Computers in the toolbar on top of the dashboard to view network and computer systems.

    Note

    Optionally, to change the level of connections displayed in the dashboard, change the value of Hops in the toolbar.

Understanding possible controls for compliance


This recipe identifies controls that may be used to fulfill compliance requirements. In addition, it maps those controls to technologies and tools such as System Center.

Getting ready

Understand your business and the scope for the compliance program based on the Planning the scope of a compliance program recipe.

How to do it...

Controls have two aspects to consider. On one hand, controls will provide you with a handle to fulfill compliance requirements. On the other hand, controls help you define processes and how tasks are done within the company. The most important thing to remember is keeping it simple. Most authority documents demand evidence of compliance but allow you to decide on the actual implementation and use of technology. Wherever possible, use automated controls based on the company's existing technologies.

The type of control implemented as part of the compliance process depends on the acceptance of your auditor, scope, the criticality of the requirement, or (simply) the budget and resources available.

The following illustration provides an overview of the type of controls:

The controls are explained as follows:

  • Administrative controls: They are most often process-related controls. For example, they influence or shape the activity of a process. Another example is that they reduce inefficiency and/or inconsistency.

  • Employee-focused controls: They could include training, such as security awareness. The goal is to ensure that the employee knows what he or she is supposed to do and how.

  • Technical controls: They focus on controls related to technical systems.

  • General controls: They focus on the overall IT environment. The goal is to ensure that all IT operations are running in a secure and failure-free manner.

  • Application controls: They are, as the name indicates, focused on the application level. The goal is to ensure that the processing, saving, exporting, and so on of data are correct. For example, technical controls exist to ensure the principles of orderly bookkeeping.

Regardless of compliance requirements, the implementation of administrative and technical controls is essential to ensure the survival of your company. Without any controls, the orderly conduct of business is not possible. In almost any company, some controls exist; however, they might not be obvious, as they are already integrated into the technologies used, or they may exist and not be documented.

There are also different characteristics to controls. Those include the following:

  • Manual controls: They are always performed by a person.

  • Automated controls: They are performed by an IT system.

  • Preventive controls: They try to guard against a risk or an undesired situation from occurring.

  • Detective controls: They collect data and try to discover inconsistency or whether a risk has occurred based on the collected data. Therefore, the undesired event has taken place, but it will be reported in some way to act upon.

With regard to the fulfillment of compliance requirements, the characteristic of a control must be weighted differently. For example, the most desirable control is an automated, preventive one followed by an automated detective one. Automated controls are viewed as more consistent and are not subject to personal interpretation. Therefore, an auditor will always favor those over manual ones. Keep this in mind when deciding on controls.

How it works...

The kind of control to use always depends on the situation of the company and the risk the control is supposed to address. Several factors influencing the decision of controls are listed here:

  • The size of your company

  • The legal structure of the company

  • Services or products offered

  • Employee qualifications

First, let's focus on an administrative control. One requirement might be to ensure the prevention of process inconsistency. The risk might be process inefficiency or an undesired activity by an employee. One example is having the right to enter supplier or customer data including financial data and the right for payment up to a certain limit. In this case, the employee could alter the bank details and then issue a payment; alternatively, the employee could split a payment into two if the bill is higher than his or her allowed payment limit.

The most desired control would be an automated preventive one. In this example, a role-based access control would prevent the first example, as most modern purchase order systems allow the creation of roles and tying those to certain rights or areas. The preventive measure here provides segregation of duty by splitting the process between two employees, preventing risk.

An automated detective control could be to check whether bank information for a certain supplier or customer has been changed right before a payment. To mitigate the second example, check if several payments have been made within a short timeframe with the same reference number.

When focusing on small companies, segregation of duties might not be possible, or the application might not offer role-based access controls. In this case, a manual preventive control could be used. One example is the four-eye principle. In this case, another employee has to approve payment as well.

The least desirable control would be manual detective. The amount of data or the number of transactions due to automated IT systems has been growing so much that inconsistency will most likely not be visible. Nonetheless, a manual detective control could be to pick several payments and check them for orderly processing.

Administrative controls have a protective function, as they try to prevent undesired events from happening. They do not exist to monitor every movement of an employee. Instead, they try to mitigate the risk that an employee might face a situation where, under pressure, an undesirable event could occur.

The next example focuses on technical controls. Again, we will use the purchase order system as an example. As mentioned before, data protection laws require protection of sensitive data. As an example, the German BDSG mentioned in the first recipe requires access control to prevent unauthorized usage. Please refer to Appendix, Useful Websites and Community Resources, for further information on BDSG.

The standard PCI DSS is fairly general, it demands access control in the form of authentication or logon without mentioning any system. As part of an authentication procedure, most companies will use a username and password combination. The kind of authentication procedure might depend on the product or service offered.

For highly sensitive products such as the ones in the military, research, or the medical industry, a more sophisticated implementation might be desirable. This will shape the kind of control required. We will focus on the most common authentication with a username and password. In order to ensure a meaningful password, many companies have an administrative control in place requiring adherence to a password policy.

An automated preventive control is the introduction of Microsoft Active Directory and the creation of a Group Policy Objects (GPO) that demands a certain password complexity. Therefore, a user will be prevented from using shorter, non-compliant passwords. The same thing might be possible within applications.

An automated detective control could be a tool that scans for undesired passwords. In this case, employees could use a non-compliant password, but the administrator would receive a report showing these. The administrator is now in a situation to remediate instances of non-compliance or recommend further action in the case of repeated occurrence.

A manual preventive control could be the usage of password letters. In this case, an employee would create passwords.

A manual detective control isn't feasible to ensure complexity of passwords. However, an example can be ensuring that only relevant people have access to an application. In this case, HR would provide a list of employees who have left the company or changed positions. The compliance team with the IT team would check whether those employees are no longer active in critical applications.

To understand the kind of controls available, you can try using a brainstorm technique. This could include the following:

  • Talking to application owners to identify existing application controls, for example, roles in an application for an access management control

  • Researching industry best practices for the objective you have; for example, access (and identity) management offers many papers from Microsoft on how to achieve this using Microsoft Active Directory Domain Service (AD DS)

  • Researching frameworks that offer a list of controls

Evaluating the efforts of controls


The following recipes provide information on how to evaluate controls based on the benefit they have for your business.

Getting ready

Understanding the controls considered and the one-time cost and operational cost associated with them.

How to do it...

When identifying and deciding on the controls, bear in mind the principle keep it simple. Most authority documents only require evidence of compliance but do not demand certain controls. Therefore, use controls that are available within your company whenever possible. When brainstorming for possible controls for a given requirement, use the most efficient and cost-effective one. Many times, one control might not be sufficient, and several controls may have to be implemented to get the desired effect.

The most straightforward approach is to look at the objective and answer the question whether the control will reduce the risk of reaching your objective within an acceptable level. An acceptable level could mean that some controls will not reach their goal. To do this, a matrix is a great help.

A more holistic approach is harder to evaluate, as the cost of a control is most often easier to calculate than the benefit it creates. Still, it should be considered. When deciding on the right control, do not only look at the control itself but at the broader scope the control has on your business. It is important to understand what technology could be used to implement this control or what technology is underlying the control and could be used to create benefits to the business. The following illustration provides some examples on cost versus benefit for controls that help evaluate which controls to choose:

Automated controls are always more desirable than manual ones. The cost effectiveness of such controls comes from the following:

  • Automation of monitoring and regulation activities

  • Achievement of a much higher coverage through automated controls, for example, an example eliminating a higher percentage of (fraud) risks

  • Creating process efficiency

  • Creation of objective controls as they lower audit costs

In the previous recipes, we talked about compliance requirements for access and authentication management. In the next recipe, we will discuss authorization.

Access and identity management is a compliance requirement that is found in different regulatory requirements. In cases where identity lifecycle management is purely a manual activity, creating controls for this might may seem like creating more manual work; however, by introducing Microsoft Active Directory Domain Services, the identity lifecycle management process, including deletion and changes, will be more efficient.

GPO for password compliance is an automated control already within the AD DS. The only manual effort is deciding on GPO and configuring it within AD DS. The overall one-time cost of planning an Active Directory Domain and implementing it will outweigh the cost and resources required for manual activities, such as using creation and management in each and every application as well as ensuring password compliance to meet requirements. Hence, the potential exists to create more efficient processes within systems and applications.

Audit costs are quite often lower for automated controls than for manual ones. Automated controls do not face the risk of human error or subjective interpretation. Therefore, auditors require more evidence that a manual control is effective, thus qualifying for the goal of the control.

Another qualifier for an automated control is a detective one, as those could help to minimize undesirable cash outflow. Think about an example; suppose that the wrong supplier has been chosen, leading to the loss of favorable supplier conditions, such as discounts.

The competitive advantage should be considered to evaluate the usage of a control. Controls help prevent failure of the company or a certain unit. As an example, take PCI DSS and the result of noncompliance.

Creating a compliance program could open up new markets, while noncompliance could eliminate them. The PCI DSS mentioned in the previous recipe is an example of eliminating a customer base in the case of noncompliance. As mentioned before, without compliance, the credit institutes reserve the right to revoke processing of credit cards.

Another competitive benefit of compliance controls is opening up new customers and markets. One of the most basic compliance regulations, tax compliance, is such an example. In many countries, governmental bidding invitations are only open to companies that have declared tax in time and have paid their taxes. The consequence of noncompliance could be the loss of potential orders.

More companies demand certain IT security certification to be eligible to provide a bid. As IT security is one of the aspects of many regulatory requirements, the first step toward such a certificate is already made.

How it works...

Evaluating the effectiveness of a control requires research on your part to understand the impact they have on the business. At one side are the costs incurred by them, and on the other side are the possible benefits when implementing them.

Bringing it all together into a basic compliance program


This recipe provides advice and examples on how to read an authority document and extract the requirements it contains. In addition, the recipe will provide examples on how to translate those requirements into controls.

Getting ready

Obtain the authority documents that you want to focus on. Most of them are available on the Internet.

Work through the previous recipes Planning the scope of a compliance program and Understanding possible controls for compliance.

How to do it...

The key is to understand the authority documents. The first step is to extract the required control objectives or the goal(s) and, based on the required evidence or activities, to define the control activities. After identifying and defining the control objectives and control activities, the next step is to relate those to the actual implementation within the business. The process looks as shown in the following illustration:

Step 1 – understanding the terms of the authority document

Understanding the terms of the authority document is essential as each authority document might put a different meaning on key terms. Sometimes, the authority documents contain explanations of such key terms. Quite often, there are accompanying documents that offer more detailed explanations.

For example, the German BDSG defines key terms in §1 to §3. In addition, the Federal Commissioner for Data Protection and Freedom of Information (FfDF) provides the document BDSG – Text and Explanations that comments not only on key terms but also on objectives and required controls.

Step 2 – identifying objects and/or requirements based on key words

The next step in creating your compliance program is to identify objectives and/or requirements based on keywords within the authority document. Examples of such keywords are control, monitor, prevent, protect, identify, and so on. Note those paragraphs as they are the input for the next step. In addition, if authority documents are updated or changed, you know the origin of a certain control objective or control activity. Knowing the originals will make it much easier to incorporate updates or changes into your compliance program.

For example, the German BDSG is quite clear on objectives. As mentioned before, Appendix (to §9 paragraph 1) states the following:

3. to ensure that people authorized to use a data processing system can only access data they are authorized for, …(access control),

This example is easy to understand as the keyword, access control, already states the control objective or goal. Ensuring access management is the control objective we have to look at.

Step 3 – identifying controls that fulfill this objective

The next step in our process is to identify controls that fulfill this objective. In order to do this, the following two questions should be answered:

  • What is necessary for a risk not to occur?

  • What reasonable steps and control(s) do we have to implement to reach the goal?

Going back to the example from step 2, the risk addressed is unauthorized access. Therefore, the authority documents focus on the authorization mechanism. The controls have to ensure the risk is limited and/or mitigated.

Implement the correct scope that is relevant to the effort required to implement each control.

Step 4 – mapping controls to your business – defining the scope

Based on the authority document, we know that sensitive personal data is included; thus, with regard to our purchase order system, all sensitive data within it will be in scope. We also know, based on the previous example, that any person with access to this information within the application must be included. The focus here is on the digital person, meaning their technical identity, such as user accounts.

Step 5 – mapping controls to your business – defining the type of controls

Depending on your company and environment, different controls could be used. Thinking back on the type of control, an application control such as automated preventive is most desirable. A sophisticated approach is to use a role-based access control. This requires an application system that provides capabilities to create roles with rights to access certain information or functions and to actually configure and use those capabilities. In this case, the application itself will automatically prevent users from accessing information they are not authorized for. Looking at our example of a purchase order system, most applications already provide such functions and role concepts. They just have to be configured. The benefit of using such a control is quite high, while the cost incurred is quite low.

Some applications do not offer such role-based access controls. In this case, a manual preventive control could be used to ensure basic authorization control. A possible control is an approval process. Before a system administrator grants access to the application, the line manager and information owner have to authorize access to the application and data for that given user. The prerequisite is that an authorization mechanism is configured for the application.

Step 6 – mapping controls to your business – defining the broader scope to simplify controls

The last step is to understand those controls in the broader scope—that of the business. BDSG will not be the only authority document requesting controls in access management. Look at the broader scope and evaluate whether a more generalized approach is more appropriate. Creating either the automated or manual control will benefit the company, as it will minimize the risk of fraud. The authority document states that people authorized to use the application are in scope as well as the application.

While evaluating the controls, the implementation of role-based access control or access management controls might be more expensive and time-consuming at the first view. However, considering that most likely not only one application but many applications have to have access management (authorization) controls, it might be more cost-effective to consider the broader scope using a role-based access management solution. To manage those access rights consistently and efficiently, they should not be configured individually. Instead, access rights should be given on a group level, most likely standing for a certain role those people have. Each role or group allows the fulfillment of a certain aspect of a job, such as managing purchase orders or approving purchase orders. So, all rights required to manage purchase orders, such as creating, changing, or deleting orders, will be included. The usage of those roles will have the added benefit of making the access and identity management process much more efficient for administrators.

The following table provides further examples on control objectives and possible technical implementations for controls with regard to the authority document:

Authority document

Authority document goal

Technology to achieve goal

Scope

Cost/benefit

PCI DSS – 7.1

Limits access to system components and cardholder data to only those individuals whose job requires such access

Ensures access management

Segregation of duty within the application and OS

Use of automation, such as System Center Orchestrator (SCO), to grant access based on roles

All accounts/applications with access to cardholder data

Cost: Planning and implementation of segregation of duty

Benefit: Process enhancement, for example, automated provision of accounts

Reduces risk of fraud

Sarbenes Oxley Act (SOX) – Section 404

Demands annual report on adequate internal control for financial reporting

Several goals, for example, monitoring

Audit trails or logs of applications use SCOM ACS for monitoring

All critical applications with financial transactions (criticality must be defined by business)

Cost: Planning and implementation of SCOM ACS

Benefit: Reputation

Many authority documents will not provide clear and detailed information on the goals and how to realize them. The preceding categories should guide you in how to take them apart to determine control objectives, subsequently control activities, and determine what Microsoft technologies to use to achieve them.

How it works...

The compliance program you create and manage will help to ensure adherence to compliance requirements. The results of the compliance program are only as good as your understanding of the authority document and implemented controls. A thorough planning phase is very important.

Adopt the steps described previously according to your specific requirements and company.

Prioritize your authority document and control implementation. For example, you could create a matrix for high risks, putting in all regulations or standards that have a high impact on your business. As shown in previous recipes, if you depend on credit card payments from customers, fulfillment of the PCI DSS standard is essential to your continuous business operations. So this should receive high risk.

Export compliance is essential to any international freight shipping business; otherwise, it might be considered low priority. It has to be considered but not in the first phase.

Likewise, consider controls that are easy to implement and cover a large number of requirements. There are many more examples, so look at the authority documents, and understand how they impact your business and which controls will fulfill those requirements.

Left arrow icon Right arrow icon

Key benefits

What you will learn

Design and implement your compliance program. Explore Microsoft Security Compliance Manager as a base entry solution for your compliance program. Export configuration items ready for use in System Center Configuration Manager. Use Microsoft System Center Configuration Manager to create, deploy, and manage the life cycle of compliance baselines. Use Microsoft System Center Operations Manager to monitor for compliance breaches. Design and run reports to understand your compliance status and security audit state. Deploy Microsoft System Center Service Manager to centralize and efficiently manage your compliance program.

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Buy Now

Product Details


Publication date : Oct 31, 2014
Length 284 pages
Edition : 1st Edition
Language : English
ISBN-13 : 9781782171706
Vendor :
Microsoft

Table of Contents

17 Chapters
Microsoft System Center 2012 R2 Compliance Management Cookbook Chevron down icon Chevron up icon
Credits Chevron down icon Chevron up icon
About the Authors Chevron down icon Chevron up icon
About the Reviewers Chevron down icon Chevron up icon
www.PacktPub.com Chevron down icon Chevron up icon
Preface Chevron down icon Chevron up icon
Starting the Compliance Process for Small Businesses Chevron down icon Chevron up icon
Implementing the First Steps of Basic Compliance Chevron down icon Chevron up icon
Enhancing the Basic Compliance Program Using Microsoft System Center 2012 Configuration Manager Chevron down icon Chevron up icon
Monitoring the Basic Compliance Program Chevron down icon Chevron up icon
Starting an Enterprise Compliance Program Chevron down icon Chevron up icon
Planning a Compliance Program in Microsoft System Center 2012 Chevron down icon Chevron up icon
Configuring a Compliance Program in Microsoft System Center 2012 Service Manager Chevron down icon Chevron up icon
Automating Compliance Processes with Microsoft System Center 2012 Chevron down icon Chevron up icon
Reporting on Compliance with System Center 2012 Chevron down icon Chevron up icon
Useful Websites and Community Resources Chevron down icon Chevron up icon
Index Chevron down icon Chevron up icon

Customer reviews

Filter icon Filter
Top Reviews
Rating distribution
Empty star icon Empty star icon Empty star icon Empty star icon Empty star icon 0
(0 Ratings)
5 star 0%
4 star 0%
3 star 0%
2 star 0%
1 star 0%

Filter reviews by


No reviews found
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.