Cisco CloudCenter: Get the Hybrid IT Advantage

IT Security Management (ITSM)

Definition - What does IT Security Management (ITSM) mean?

IT security management (ITSM) intends to guarantee the availability, integrity and confidentiality of an organization's data, information and IT services. IT Infrastructure Library (ITIL) security management generally forms part of an organizational strategy to security management that has a broader scope compared to an IT service provider.

ITIL v3 considers IT security management as part of their service design core volume, which results in a more effective integration of this process into the service life cycle. An information security manager is the process owner of IT security management.

Techopedia explains IT Security Management (ITSM)

The following are information management sub-processes and process objectives:

  • Designing security controls: To design suitable organizational and technical measures to guarantee the availability, integrity and confidentiality of an organization's data, information and IT services
  • Security testing: To ensure that all security mechanisms are subjected to regular testing
  • Managing security incidents: To identify and fight intrusions and attacks and also to minimize damages incurred due to security breaches
  • Security review: To review whether the safety measures and processes are still in accordance with risk perceptions from the business side, and also to validate whether these safety measures and processes are consistently managed and tested

The ITIL terms and information objects that are widely used in the security management process in order to signify process inputs and outputs are as follows:

  • Availability/IT service continuity management (ITSCM)/security testing schedule
  • Correlation rules and event filtering
  • Information security policy
  • Information security report
  • Security management information system (SMIS)
  • Test report
  • Underpinning Information security policy
  • Security advisories
  • Security alert
Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.