The Foundational Security Management services components follow Architectural Principles to manage the common Security Services and Infrastructure using a closed-loop, risk management process, as shown in Figure 3.
Figure 3 Foundational Security Management controls closed loop
To learn more details about the IBM Security Framework and the IBM Security Blueprint, please refer to the IBM Redpapers™ publication Introducing the IBM Security Framework and IBM Security Blueprint to Realize Business-Driven Security, REDP-4528.
The IBM Security Blueprint Redguide publications series are detailed investigations into specific types of security controls, the business risks they address, and technology neutral discussions of how to implement these controls. These guides are organized according to the Blueprint components to ensure all aspects of risk management are addressed in the control.
This particular guide addresses the business risks and IT risks associated with employees, contractors, and business partners ending their relationship with an organization, especially when the circumstances may not be congenial.
Throughout this guide, we use the term employee, but the concepts and processes described here are equally applicable to contractors and business partners. We use the term employee as a shorthand way of referencing all people who are ending their relationship with an organization.
Using the IBM Security Blueprint to Address Business Risks for Employee Offboarding