https://store-images.s-microsoft.com/image/apps.17404.ecef2ca3-13f0-458e-9967-68380a07387a.b366c0fe-3a8b-433d-b6fa-842f494ac5ca.ac606163-f0fb-4c4d-912d-4324a7965c75

Crown Jewels Identification app

Prometix

Crown Jewels Identification and assessment Power Apps

Good cyber security starts with visibility. Visibility and understanding of what matters the most to businesses, organisations and those whom they serve. A well-defined and maintained register that identifies key applications, systems, and information assets of most significance allows cyber security efforts to be prioritised and applied appropriately. Cyber security is fundamentally a risk management exercise and cannot be successful without identifying the most critical assets - "crown jewels". While the identification of crown jewels is a key requirement of several industry and government standards, the development and maintenance of these registers pose a significant challenge for organisations. Several reasons include inadequate classification and categorisation procedures, knowledge, complexity of environments, and lack of tools that can be efficiently managed. This gap was also highlighted by APRA in its recently released findings from an assessment of several regulated entities with prudential standard CPS 234 Information Security (CPS 234).

The engagement includes -

  1. Workshops for your process alignment with Crown Jewels identification
  2. Requirements confirmation brief
  3. Solution Architecture document
  4. Iteration implementation of the application 4.1 Iteration 1: Base Module implementation 4.2 Iteration 2: Customer specific changes to align with your processes
  5. As Build Document
  6. Assistance with testing
  7. End user and admin user training support
  8. Handover, Go Live and BAU

At a glance

https://store-images.s-microsoft.com/image/apps.48492.ecef2ca3-13f0-458e-9967-68380a07387a.b366c0fe-3a8b-433d-b6fa-842f494ac5ca.31dbfcdd-0ac1-42df-b0a3-dae4ffef8be1