top of page

London's Government - Enterprise Governance & Management Process

  • ali@fuzzywireless.com
  • Mar 4, 2022
  • 3 min read

London’s Enterprise Governance and Management Process – Strengths and Weaknesses

London Government (2004) perform the review of network governance and management process regularly, along with several other aspects of city governance. While reviewing the enterprise givernance and management processes of the London Government against the industry average, there were several areas where city’s enterprise infrastructure was performing well above the industry average (London Gov, 2004). Key areas where city’s network performed well, fall under the domain controller policy settings and domain account policy values. In domain controller policy settings, network excelled in:

1. Account logon events

2. Account management

3. Directory service access

4. Login events

5. Object access

6. Policy change

7. Privilege use

8. System events

Under the domain accounts policy values, strength of governance and process management shined in:

1. Password length

2. Password age

3. Password history

4. Reversible password encryption

5. Password changes for machine accounts

Other areas of administration and management of London’s IT network were also evaluated, which include network operating system controls, management and support arrangements, logical access controls, network strategy, network device security controls, remote access security controls, and firewall configuration controls (London Gov, 2004). Some of the areas where further improvement is required falls under the premises of network operating system, logical access security, network device security, and firewall security.

Improvements in Network Operating System

Under network operating system, audit of process tracking is required to establish accountability for actions performed within the system. this will ensure that program activation, indirect object access, and process exits are tracked properly, which will result in effective auditing and improved fault analysis (London Gov, 2004). Another area under network operating system, which can be improved are remote service access rights and network services. Unnecessary remote logins should be removed to improve the security posture. Similarly, known and unknown features of network services can greatly affect the stability and security of network operating system, thus reduction in unnecessary network services is important. Lastly, user accounts of network operating system require clear mapping to network users; generic user accounts need to be removed such as clusterAdmin, domainUser etc. Generic user accounts compromise the accountability of network activities (London Gov, 2004).

Improvements in Logical Security

In logical access security, it is important to limit unlimited password guessing, which otherwise can lead to network intrusion (London Gov, 2004). Effective logical security measure will block the account after certain number of incorrect password attempts, which otherwise opens the door of brute force network access thus compromising the security of network (London Gov, 2004).

Improvements in Remote Access

In the remote network access area, restriction of remote user logins is desired to limit the risk of unauthorized network access using spyware while connecting remotely (London Gov, 2004). Remote users are required to be educated regularly to setup anti-virus software and firewall while accessing the network.

Improvements in Firewall Security

Around firewall security, penetration testing is desired to evaluate the effectiveness of network security, otherwise unauthorized access might go unnoticed (London Gov, 2004). Network penetration testing by multiple service providers will gauge the effectiveness of network firewall.

Summary

All the above areas identified in network operating system, logical security, remote network access and firewall security will establish accountability of user accounts and network changes, protect system from external unauthorized access, and improve network security posture. All the weak areas identified above are necessary for the efficient and secured IT infrastructure of company. Implementation of changes will improve the network governance and management process of IT infrastructure. Thus, it is highly recommended to implement all the suggestions for the efficient and secured operations, management and governance of enterprise network.



References

London Gov (2004). Deloitte – Final Internal Audit Report, Network and Communications. Retrieved from https://www.london.gov.uk/moderngov/CeListDocuments.aspx?MID=2909&F=SubIndex%24embed%24Agenda.htm&DF=13%2F07%2F2004&A=1&R=0




















Recent Posts

See All
Rule Enforcement by Managers

Duncan (2014) stated rules and procedures as written rules, like how to sign up for company savings plan or what is the process when one...

 
 
 
Information Technology Audit

Yeagley (2015) defines audits as periodic validation of the IT security implementation of an enterprise by a certification authority....

 
 
 
Ethical Conduct Policy

Ethics are important in running whether small or large corporations. Business owners need to understand the ethical issues, while dealing...

 
 
 

Comentarios


Post: Blog2_Post
bottom of page