
Email Eddie
How can we help?
Whether you're looking for expert ITSM consulting, cutting-edge technology solutions, award-winning training courses, or hands-on IT support, explore our website and use the search box to easily find the resources, insights, and services you need.
Information Security Management and Service Operation
Strengthening Security Through Effective Information Security Management
Information Security Management plays a crucial role in protecting an organisation’s assets, data, information, and IT services. It is responsible for setting policies, standards, and procedures to ensure that these resources are safeguarded against security breaches. While Service Operation teams are key players in executing these security measures, they do not own the Information Security Management process, as this could create a conflict of interest.

Segregation of Duties for Enhanced Security
To maintain security integrity, there must be a clear segregation of roles between the teams defining and managing security processes and those executing them. This segregation helps protect against security breaches by ensuring that no single individual has control over multiple phases of a transaction or operation. Information Security Management should assign responsibilities in a way that cross-checks duties, reducing the risk of errors or malicious activities.
Policing and Reporting Security Incidents
Service Operation staff are often the first to detect security events and are best positioned to respond quickly. Their responsibilities include:
- Policing Activities: Checking system journals, logs, event monitoring alerts, and intrusion detection systems to identify and report actual or potential security breaches.
- Reporting: Collaborating with Information Security Management to provide a balanced system for effective detection and management of security issues.
When dealing with third-party organisations that require physical access to the premises, Service Operation staff may need to escort visitors into sensitive areas or control their access. They also play a crucial role in controlling network access for third parties, such as hardware maintainers who dial in for diagnostic purposes.
Providing Technical Assistance
Service Operation teams may need to provide technical support to IT Security staff during security incident investigations. This support can include:
- Assistance in Investigations: Helping gather forensic evidence for disciplinary actions or criminal prosecutions.
- Technical Advice: Offering guidance on potential security improvements, such as setting up firewalls or managing access controls.
Information from event logs, incident reports, and configuration management systems can be invaluable in providing accurate timelines and data during security investigations.
Operational Security Control
Given their role, technical staff often need privileged access to critical areas, such as system passwords, data centres, or communications rooms. To maintain security:
- Audit Trails: It’s essential to keep detailed records of all privileged activities to deter and detect security breaches.
- Physical Controls: Secure areas should have strict logging procedures for staff access. Third-party access must be carefully managed and documented.
- Restricted Access: Only verified personnel should have system access, and this access must be revoked immediately when it is no longer needed. An audit trail should document who accessed the system and what activities were performed.
- Vetting and Screening: All Service Operation staff, as well as suppliers and third-party contractors, should undergo security screening appropriate to the organisation’s needs. Background checks, non-disclosure agreements, and confidentiality clauses should be standard practice, especially when working with classified systems.
Training and Awareness
Regular training and awareness programmes are essential to ensure that all Service Operation staff are familiar with the organisation’s security policies and procedures. This training should be ongoing and include information on disciplinary measures for non-compliance. Security requirements should also be clearly stated in each employee’s contract of employment.
Documented Policies and Procedures
Documented procedures for Service Operation teams must include all relevant security information extracted from the organisation’s overall security policy. Consideration should be given to creating handbooks or guides to effectively communicate these security protocols to all staff members.
Protect Your Organisation with Pink Elephant
At Pink Elephant, we understand the importance of robust Information Security Management. Our expertise can help your organisation implement effective security measures, ensuring that your assets, data, and IT services remain secure and compliant. Contact us today to learn more about our comprehensive security solutions.
Case studies

Growth powered by Pink Elephant’s SIAM IT Service Desk
Corplex (formerly DS Smith Plastics, Extruded Products) is a leading manufacturer of innovative reusable packaging. With a history spanning 50 years, Corplex rebranded in 2020 after being acquired by Olympus Partners. The company is dedicated to sustainability and excellence, establishing itself as a trusted name in the Reusable Transport Packaging...

Bespoke Customer Service training programme for GTT
Pink Elephant EMEA builds on the success of a GTT’s customer service offering with a bespoke virtual training programme. Find out more below about the objectives, challenges, and successes of delivering a training programme to 250+ GTT employees, in three countries, across three time zones.Find Out More about Customer Service...

AON optimises ITSM and UX
Aon PLC, a leading British-American multinational professional services firm, offers a wide range of financial risk-mitigation products, including insurance, pension administration, and health insurance plans. To continue delivering exceptional service across its global operations, Aon sought to transform its IT Service Management (ITSM) practices and enhance the user experience.The Challenge:...