Member-only story

A Journey to the Highest Cybersecurity Maturity: Service Desk, Part 6

Requests Cycle

Vicente Aceituno Canal
The CISO Den
Jul 9, 2024

--

Photo by Annie Spratt on Unsplash

Previously in this series:

Requests

The Request Cycle satisfies requests in connection with the process. Some examples of requests are:

  • Creation of a user account
  • Deletion of a firewall rule
  • Restore of a backup
  • Reset of a credential
  • Etc…

The inputs of this cycle are:

  • List of Requests per Category (entered during the last period) (​​​outputs are delivered in response to an input which timing can’t be accurately forecasted)

The outputs of this cycle are:

  • List of Requests per Category (current outcomes)

The supporting documents are:

  • Request Fulfillment Procedure (all Categories)

The next cycle we will cover is the Knowledge Management Cycle

Next in this series:

--

--

The CISO Den
The CISO Den

Published in The CISO Den

The CISO Den is about how to deliver the best cybersecurity for organizations, no matter the size, budget, industry or country

Vicente Aceituno Canal
Vicente Aceituno Canal

Written by Vicente Aceituno Canal

Evidence-based cybersecurity management leader

No responses yet