{"id":20430,"date":"2025-03-11T14:00:37","date_gmt":"2025-03-11T17:00:37","guid":{"rendered":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=20430"},"modified":"2025-03-11T12:20:39","modified_gmt":"2025-03-11T15:20:39","slug":"the-information-assurance-maturity-model-and-assessment-framework","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/the-information-assurance-maturity-model-and-assessment-framework\/","title":{"rendered":"The Information Assurance Maturity Model and Assessment Framework"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-20431\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2025\/03\/the-information-assurance-maturity-model-and-assessment-framework.jpg\" alt=\"The Information Assurance Maturity Model and Assessment Framework\" width=\"145\" height=\"205\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2025\/03\/the-information-assurance-maturity-model-and-assessment-framework.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2025\/03\/the-information-assurance-maturity-model-and-assessment-framework-106x150.jpg 106w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>CESG &#8211; National Technical Authority for Information Assurance<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>R\u00e9sum\u00e9:<\/strong><\/span> Accounting Officers (AOs), supported by their Senior Information Risk Owners (SIROs) and their Information Asset Owners (IAOs), are accountable for the adequate protection of information collected, processed and stored within their organisations. Information is a key asset within Government, but it can become a critical liability. Increasingly Departments and other public bodies need to share information in response to the Government\u2019s digital and shared services agendas. AOs need governance that provides effective Information Risk Management (IRM) processes and procedures that address information risk and provide assurance that information that is passed to others is protected appropriately. The IRM regime must be sufficiently robust to assure the Department on the information risks arising from the impact of the developing Government ICT Strategy (reference [a]) programmes.<\/p>\n<p><a href=\"https:\/\/www.bibliotecadeseguranca.com.br\/wp-content\/uploads\/2025\/03\/the-information-assurance-maturity-model-and-assessment-framework.pdf\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-12143 size-full\" src=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2015\/03\/download_fr.gif\" alt=\"T\u00e9l\u00e9charger\" width=\"107\" height=\"25\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CESG &#8211; National Technical Authority for Information Assurance R\u00e9sum\u00e9: Accounting Officers (AOs), supported by their Senior Information Risk Owners (SIROs) and their Information Asset Owners (IAOs), are accountable for the adequate protection of information collected, processed and stored within their organisations. Information is a key asset within Government, but it can become a critical liability. Increasingly Departments and other public bodies need to share information in response to the Government\u2019s&hellip; <\/p>\n","protected":false},"author":3,"featured_media":20431,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,6,20,112],"tags":[],"class_list":["post-20430","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-english","category-livros","category-seguranca-da-informacao","category-download"],"views":225,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/20430","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=20430"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/20430\/revisions"}],"predecessor-version":[{"id":20432,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/20430\/revisions\/20432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/20431"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=20430"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=20430"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=20430"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}