Читать книгу Security Administration A Complete Guide - 2020 Edition - Gerardus Blokdyk - Страница 8

Оглавление

CRITERION #2: DEFINE:

INTENT: Formulate the stakeholder problem. Define the problem, needs and objectives.

In my belief, the answer to this question is clearly defined:

5 Strongly Agree

4 Agree

3 Neutral

2 Disagree

1 Strongly Disagree

1. What are the tasks and definitions?

<--- Score

2. Have all basic functions of Security Administration been defined?

<--- Score

3. Is it clearly defined in and to your organization what you do?

<--- Score

4. Is there a critical path to deliver Security Administration results?

<--- Score

5. What is the scope of Security Administration?

<--- Score

6. What is out of scope?

<--- Score

7. Is there a completed, verified, and validated high-level ‘as is’ (not ‘should be’ or ‘could be’) stakeholder process map?

<--- Score

8. How did the Security Administration manager receive input to the development of a Security Administration improvement plan and the estimated completion dates/times of each activity?

<--- Score

9. How is the team tracking and documenting its work?

<--- Score

10. Is Security Administration currently on schedule according to the plan?

<--- Score

11. Do you have organizational privacy requirements?

<--- Score

12. Is special Security Administration user knowledge required?

<--- Score

13. What customer feedback methods were used to solicit their input?

<--- Score

14. Has/have the customer(s) been identified?

<--- Score

15. Is there regularly 100% attendance at the team meetings? If not, have appointed substitutes attended to preserve cross-functionality and full representation?

<--- Score

16. How would you define Security Administration leadership?

<--- Score

17. How do you gather the stories?

<--- Score

18. Who defines (or who defined) the rules and roles?

<--- Score

19. What are the record-keeping requirements of Security Administration activities?

<--- Score

20. Is there a Security Administration management charter, including stakeholder case, problem and goal statements, scope, milestones, roles and responsibilities, communication plan?

<--- Score

21. Is the Security Administration scope manageable?

<--- Score

22. What are (control) requirements for Security Administration Information?

<--- Score

23. What constraints exist that might impact the team?

<--- Score

24. What are the Roles and Responsibilities for each team member and its leadership? Where is this documented?

<--- Score

25. What is the definition of success?

<--- Score

26. What is a worst-case scenario for losses?

<--- Score

27. How do you hand over Security Administration context?

<--- Score

28. What are the core elements of the Security Administration business case?

<--- Score

29. Are resources adequate for the scope?

<--- Score

30. What scope to assess?

<--- Score

31. Is there a completed SIPOC representation, describing the Suppliers, Inputs, Process, Outputs, and Customers?

<--- Score

32. What would be the goal or target for a Security Administration’s improvement team?

<--- Score

33. What Security Administration requirements should be gathered?

<--- Score

34. How do you manage scope?

<--- Score

35. What are the requirements for audit information?

<--- Score

36. How do you build the right business case?

<--- Score

37. How was the ‘as is’ process map developed, reviewed, verified and validated?

<--- Score

38. Have you defined the scope and objectives of the Security Administration function?

<--- Score

39. Is there a clear Security Administration case definition?

<--- Score

40. How are consistent Security Administration definitions important?

<--- Score

41. Scope of sensitive information?

<--- Score

42. Who is gathering information?

<--- Score

43. Are approval levels defined for contracts and supplements to contracts?

<--- Score

44. How do you catch Security Administration definition inconsistencies?

<--- Score

45. What is in the scope and what is not in scope?

<--- Score

46. What information do you gather?

<--- Score

47. How will the Security Administration team and the group measure complete success of Security Administration?

<--- Score

48. Are customer(s) identified and segmented according to their different needs and requirements?

<--- Score

49. What gets examined?

<--- Score

50. Is full participation by members in regularly held team meetings guaranteed?

<--- Score

51. How do you manage changes in Security Administration requirements?

<--- Score

52. What is the scope of the Security Administration effort?

<--- Score

53. Is the current ‘as is’ process being followed? If not, what are the discrepancies?

<--- Score

54. Is Security Administration required?

<--- Score

55. Who approved the Security Administration scope?

<--- Score

56. Why are you doing Security Administration and what is the scope?

<--- Score

57. Are roles and responsibilities formally defined?

<--- Score

58. What are the compelling stakeholder reasons for embarking on Security Administration?

<--- Score

59. Are task requirements clearly defined?

<--- Score

60. Are there any constraints known that bear on the ability to perform Security Administration work? How is the team addressing them?

<--- Score

61. How would you define the culture at your organization, how susceptible is it to Security Administration changes?

<--- Score

62. Does the scope remain the same?

<--- Score

63. How and when will the baselines be defined?

<--- Score

64. Will team members perform Security Administration work when assigned and in a timely fashion?

<--- Score

65. Is Security Administration linked to key stakeholder goals and objectives?

<--- Score

66. Are all requirements met?

<--- Score

67. Is scope creep really all bad news?

<--- Score

68. Does the team have regular meetings?

<--- Score

69. When are meeting minutes sent out? Who is on the distribution list?

<--- Score

70. What are the rough order estimates on cost savings/opportunities that Security Administration brings?

<--- Score

71. What happens if Security Administration’s scope changes?

<--- Score

72. How do you gather Security Administration requirements?

<--- Score

73. What is the definition of Security Administration excellence?

<--- Score

74. Is data collected and displayed to better understand customer(s) critical needs and requirements.

<--- Score

75. What critical content must be communicated – who, what, when, where, and how?

<--- Score

76. Who are the Security Administration improvement team members, including Management Leads and Coaches?

<--- Score

77. What is the worst case scenario?

<--- Score

78. What Security Administration services do you require?

<--- Score

79. Is the Security Administration scope complete and appropriately sized?

<--- Score

80. What intelligence can you gather?

<--- Score

81. What was the context?

<--- Score

82. Is the improvement team aware of the different versions of a process: what they think it is vs. what it actually is vs. what it should be vs. what it could be?

<--- Score

83. When is the estimated completion date?

<--- Score

84. Has a high-level ‘as is’ process map been completed, verified and validated?

<--- Score

85. If substitutes have been appointed, have they been briefed on the Security Administration goals and received regular communications as to the progress to date?

<--- Score

86. What are the Security Administration use cases?

<--- Score

87. How does the Security Administration manager ensure against scope creep?

<--- Score

88. Do the problem and goal statements meet the SMART criteria (specific, measurable, attainable, relevant, and time-bound)?

<--- Score

89. What knowledge or experience is required?

<--- Score

90. Are accountability and ownership for Security Administration clearly defined?

<--- Score

91. In what way can you redefine the criteria of choice clients have in your category in your favor?

<--- Score

92. What are the Security Administration tasks and definitions?

<--- Score

93. Are audit criteria, scope, frequency and methods defined?

<--- Score

94. Will team members regularly document their Security Administration work?

<--- Score

95. Is the team equipped with available and reliable resources?

<--- Score

96. What are the dynamics of the communication plan?

<--- Score

97. Has your scope been defined?

<--- Score

98. Is the team adequately staffed with the desired cross-functionality? If not, what additional resources are available to the team?

<--- Score

99. Have specific policy objectives been defined?

<--- Score

100. Do you have a Security Administration success story or case study ready to tell and share?

<--- Score

101. What is the scope of the Security Administration work?

<--- Score

102. How often are the team meetings?

<--- Score

103. Will a Security Administration production readiness review be required?

<--- Score

104. How have you defined all Security Administration requirements first?

<--- Score

105. Are required metrics defined, what are they?

<--- Score

106. Has a project plan, Gantt chart, or similar been developed/completed?

<--- Score

107. Who is gathering Security Administration information?

<--- Score

108. How will variation in the actual durations of each activity be dealt with to ensure that the expected Security Administration results are met?

<--- Score

109. Has a Security Administration requirement not been met?

<--- Score

110. Are the Security Administration requirements testable?

<--- Score

111. Has everyone on the team, including the team leaders, been properly trained?

<--- Score

112. Have the customer needs been translated into specific, measurable requirements? How?

<--- Score

113. The political context: who holds power?

<--- Score

114. Is the work to date meeting requirements?

<--- Score

115. Are there different segments of customers?

<--- Score

116. What baselines are required to be defined and managed?

<--- Score

117. Has anyone else (internal or external to the group) attempted to solve this problem or a similar one before? If so, what knowledge can be leveraged from these previous efforts?

<--- Score

118. How can the value of Security Administration be defined?

<--- Score

119. What system do you use for gathering Security Administration information?

<--- Score

120. How do you think the partners involved in Security Administration would have defined success?

<--- Score

121. What key stakeholder process output measure(s) does Security Administration leverage and how?

<--- Score

122. What is in scope?

<--- Score

123. What sort of initial information to gather?

<--- Score

124. How do you manage unclear Security Administration requirements?

<--- Score

125. What are the boundaries of the scope? What is in bounds and what is not? What is the start point? What is the stop point?

<--- Score

126. What scope do you want your strategy to cover?

<--- Score

127. Has the direction changed at all during the course of Security Administration? If so, when did it change and why?

<--- Score

128. What information should you gather?

<--- Score

129. What specifically is the problem? Where does it occur? When does it occur? What is its extent?

<--- Score

130. How do you keep key subject matter experts in the loop?

<--- Score

131. When is/was the Security Administration start date?

<--- Score

132. Where can you gather more information?

<--- Score

133. Are different versions of process maps needed to account for the different types of inputs?

<--- Score

134. Has the improvement team collected the ‘voice of the customer’ (obtained feedback – qualitative and quantitative)?

<--- Score

135. Has the Security Administration work been fairly and/or equitably divided and delegated among team members who are qualified and capable to perform the work? Has everyone contributed?

<--- Score

136. How do you gather requirements?

<--- Score

137. Has a team charter been developed and communicated?

<--- Score

Add up total points for this section: _____ = Total points for this section

Divided by: ______ (number of statements answered) = ______ Average score for this section

Transfer your score to the Security Administration Index at the beginning of the Self-Assessment.

Security Administration A Complete Guide - 2020 Edition

Подняться наверх