ABCDEFGHIJKLM
1
DescriptionInfrastructureOther
2
HEATCustomerUISNTS
3
User Managment
4
Default access control (CESI/ group policy) RA
5
Additional user/group and permissionsRA
6
7
Firewall Managment
8
Initial setupRA
9
Firewall monitoring (guardrails)RA
10
Firewall modificationIRA
11
12
Networking
13
IP addressingRA
14
DNS A recordsRA
15
DNS AliasesR*A*depends on the dns suffix
16
17
Virtual hardware management
18
Initial disk creation/partitioningRAI
19
Increase VM storageRA**partially automated
20
Adjust logical volume sizeR(Windows)R(Linux)
21
Additional memory/CPU RA*
*Accountable for responsible allocation of resources
22
23
Operating System Security **See definitions section
24
SELinuxIRA
25
Vulnerability Scanning: ServiceRA
26
Vulnerability Scanning: ScansRAIC
27
System resource/process monitoringRA
28
Vulnerability RemediationRAIC
29
Data destruction/deletionRA
30
System Logging Service (Splunk)RA
31
System level logging (Splunk agent)RACI
32
System Log Monitoring and AnalysisRA
33
34
Customer Application*See definitions section
35
Software addition and configurationRA
36
Application updates and security patchesRA
37
Application service/process monitoringRA
38
Application troubleshootingRA
39
Application vulnerability remediationRA
40
Certificate request/updatesCRA
41
VM snapshot RA
42
Maintenance/updatesRA
43
Application Log Monitoring and AnalysisRA
44
45
Reactive Security Events
46
Server Isolation/ShutdownRIA
47
Offline Server- triage application/OS concernCIR
48
Offline server remedition - applicationCIR
49
Offline server remedition - core OSRIA
50
Response to Suspicious ActivityRCA
51
52
53
Automation
54
Initial VM setup/configurationRA
55
DecommissionRA
56
57
Business Continuity
58
BackupRACI
59
Disaster RecoveryRAC
60
System or file restoresRAI
61
62
Maintenance
63
OS security updatesRA
64
OS non security updatesRA
65
OS patch verification: core OS functionalityRA
66
OS patch verification: application functionalityR
67
Mandatory RebootsRAI
68
69
Documentation, Policies, Procedures
70
Asset InventoryRI
71
Process review and improvementRAI
72
Security Baseline, UMN policyRA
73
Security Baseline, applying and maintainingRAC
74
Admin/User ManualsR
75
76
77
Key
78
R = ResponsibleThose who are responsible for the correct completion of the task
79
A = AccountableThe one ultimately answerable for the correct and thorough completion of the deliverable or task
80
C = ConsultedThose whose opinions are sought (2-way communication)
81
I = InformedThose who are kept up-to-date on progress (1-way communication)
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100