0% found this document useful (0 votes)
15 views

Sys Admin Resp

The document outlines the responsibilities of a system/network administrator which include: 1) Assisting with security and contingency plans, participating in risk assessments and self-assessments, and certifying systems. 2) Ensuring proper implementation of technical security controls and developing administration procedures. 3) Monitoring systems for incidents and notifying security officers, and reading all applicable training materials and policies.

Uploaded by

eddiebob
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Sys Admin Resp

The document outlines the responsibilities of a system/network administrator which include: 1) Assisting with security and contingency plans, participating in risk assessments and self-assessments, and certifying systems. 2) Ensuring proper implementation of technical security controls and developing administration procedures. 3) Monitoring systems for incidents and notifying security officers, and reading all applicable training materials and policies.

Uploaded by

eddiebob
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

System/Network Administrator Responsibilities

1 2 3 4 5 6 7 8 9 10 Assist system owners in the development and maintenance of security plans for all general support systems and major applications under their responsibility. Assist system owners in the development and maintenance of contingency plans for all general support systems and major applications under their responsibility. Participate in risk assessments to periodically re-evaluate sensitivity of the system, risks, and mitigation strategies. Participate in self-assessments of system safeguards and program elements. Participate in certification and accreditation of the system. Assist the system owner in the identification of resources needed to effectively implement technical security controls. Ensure the integrity in implementation and operation of technical security controls by conducting control security test and evaluation. Develop system administration and operational procedures and manuals as directed by the system owner. Evaluate and develop procedures that assure proper integration of service continuity with other system operations. Notify the responsible Information System Security Officer, or if none, the responsible IT Security Officer of any suspected incidents in a timely manner, and assist in the investigation of incidents if necessary; On a routine basis and as warranted by the systems impact level: (a) Review audit logs from the perimeter security intrusion detection systems; (b) Review audit logs for servers and hosts on the internal, protected network; (c) Review all trouble reports received by system administration personnel for symptoms that might indicate intrusive activity; suspicious symptoms should be reported to Network or IT security personnel; 11 12 13 14 (d) Check host-based intrusion-detection tools. Read and understand all applicable training and awareness materials; Read and understand all applicable use policies or other rules of behavior regarding use or abuse of operating unit IT resources; Know and abide by all applicable company policies and procedures. System administrators must be familiar with the restrictions established by the Electronic Communications Privacy Act of 1986 (Public Law 99-508), with respect to legal issues surrounding the interception of certain communications and other forms of surveillance, and implement appropriate system policies regarding keystroke monitoring.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy