Rollout process

  • Wolfgang BehnsenEmail author
  • Eberhard von FaberEmail author
Part of the Edition <kes> book series (EDKES)


The elaboration of ESARIS and its ICT Security Standards and the implementation of the procedures, rules and practices within the ICT Service Provider are complex and must carefully be planned and conducted. In this chapter, some general regulations are outlined that may help to establish the architecture in an enterprise. Firstly, it is explained how the project can be organized. The description only relates to standard project management practices. It emphasizes that the main challenge is to bring ESARIS into the employees’ hearts and minds (Sect. 8.1). The documents must be stored and kept accessible for employees. A portal is set up in the Intranet and a documents identification schema is used in order to facilitate the search for and the localization of documents (Sect. 8.2). Many documents will contain information which is the intellectual property of the ICT Service Provider and therefore needs to be communicated in a restricted way. It is part of the rollout to define rules for the exchange of documents (Sect. 8.3). ESARIS specifies security measures that are part of ICT services and made to secure them. Hence, the security measures must be considered in the specification of services, which are used by user organizations to take their buying decision. In this way, the security measures of ESARIS become an integral part of the provider’s service offering portfolio (Sect. 8.4).


Intellectual Property Security Measure User Organization Confidentiality Rule Business Continuity Management 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2012

Authors and Affiliations

  1. 1., Security Management ProductionT-Systems International GmbHMünchenGermany
  2. 2., Security Consulting and EngineeringT-Systems GEI GmbHBonnGermany

Personalised recommendations