Crown Jewels Identification and assessment Power Apps
Good cyber security starts with visibility. Visibility and understanding of what matters the most to businesses, organisations and those whom they serve. A well-defined and maintained register that identifies key applications, systems, and information assets of most significance allows cyber security efforts to be prioritised and applied appropriately. Cyber security is fundamentally a risk management exercise and cannot be successful without identifying the most critical assets - "crown jewels". While the identification of crown jewels is a key requirement of several industry and government standards, the development and maintenance of these registers pose a significant challenge for organisations. Several reasons include inadequate classification and categorisation procedures, knowledge, complexity of environments, and lack of tools that can be efficiently managed. This gap was also highlighted by APRA in its recently released findings from an assessment of several regulated entities with prudential standard CPS 234 Information Security (CPS 234).
The engagement includes -