SlideShare una empresa de Scribd logo
1 de 25
Security Policies and
Standards
Introduction
 Organization
 Collection of people working together toward a common goal
 Must have clear understanding of the rules of acceptable behavior
 Policy
 Conveys management’s intentions to its employees
 Effective security program
 Use of a formal plan to implement and manage security in the
organization
Policies,
Standards, and
Procedures
 Policy
 Set of guidelines or instructions
 Organization’s senior management implements
 Idea
 Standards
 More detailed descriptions of what must be done to comply with
policy
 Specifics and outline
 Procedures
 How to accomplish the policies and standards
Effective
Policies
 For a policy to be considered effective and legally enforceable:
 Dissemination
 Distribution of the information
 Is it in a readily available place?
 Review
 Has it been read?
 Who is reading it?
 Comprehension
 Is it understandable?
 Too confusing?
 Compliance
 Acknowledge vs. Agree
 Uniform enforcement
 How are violations being handled?
What Drives
Policy
Development?
 Mission of an organization
 Written statement of purpose of organization
 Usually Not Modified
 Vision of an organization
 Witten statement of the organization’s long-term goals
 Occasionally Modified
 Strategic planning
 Process of moving the organization toward its vision.
 Constantly Reworked to promote progress
 Security policy
 Set of rules that protects an organization’s assets
 Question:What are some security policies you are aware of?
Types of
Information
Security
Policies
 Information security policy
 Set of rules for the protection of an organization’s information
assets
 Enterprise information security policies
 General security policy
 Issue-specific security policies
 Specific technology policy
 Systems-specific security policies
 Configurations
Enterprise
Information
Security Policy
(EISP)
 Supports the mission, vision, and direction of the organization
 Sets the strategic direction, scope, and tone for all security efforts
 Executive-level document
 Drafted by organization’s chief information officer
 Expresses the security philosophy within the IT environment
 Guides the development, implementation, and management of
the security program
 Address an organization’s need to comply with laws and
regulations in two ways:
 General compliance
 Identification of specific penalties and disciplinary actions
Components
of EISP
Issue-Specific
Security Policy
(ISSP)
 Addresses specific areas of technology
 Requires frequent updates
 Contains a statement on the organization’s position on a specific
issue
 May cover:
 Use of company-owned networks and the Internet
 Use of telecommunications technologies (fax and phone)
 Use of electronic mail
 Specific minimum configurations of computers to defend against
worms and viruses
 Prohibitions against hacking or testing organization security
controls
 Home use of company-owned computer equipment
 Use of personal equipment on company networks
 Use of photocopy equipment
Components
of ISSP
Systems-
Specific Policy
(SysSP)
 Appear with the managerial guidance expected in a policy
 Include detailed technical specifications not usually found in other types of
policy documents
 Managerial Guidance SysSPs
 Guide the implementation and configuration of a specific technology
 Technical Specifications SysSPs
 General methods for implementing technical controls
 Access control lists
 Set of specifications that identifies a piece of technology’s authorized users and
includes details on the rights and privileges those users have on that technology
 Access control matrix
 Combines capability tables and ACLs
 Configuration rules
 Specific instructions entered into a security system to regulate how it reacts to the
data it receives
 Rule-based policies
 More specific to a system’s operation than ACLs
 May or may not deal with users directly
Frameworks
and Industry
Standards
 Security blueprint
 Basis for the design, selection, and implementation of all security
program elements
 Security framework
 Outline of the overall information security strategy
 Roadmap for planned changes to the organization’s information
security environment
 The ISO 27000 Series
 NIST Model
NISTSecurity
Models
 Computer Security Resource Center (CSRC) publications
 SP 800-14: Generally Accepted Principles and Practices for Securing
InformationTechnology Systems
 Lists the principles and practices to be used in the development of a
security blueprint
 SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy
 Provides an overview of the capabilities and technologies of firewalls
and firewall policies
 SP 800-53 Rev. 3: Recommended Security Controls for Federal
Information Systems and Organizations
 Describes the selection and implementation of security controls for
information security to lower the possibility of successful attack from
threats
 SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in
Federal Information Systems: Building Effective Security
Assessment Plans
 Provides a systems developmental lifecycle approach to security
assessment of information systems
Other NIST
Perimeter
Defense
Publications
Benchmarking
and Best
Practices
 Best practices
 Procedures that are accepted or prescribed as being correct or most
effective
 Benchmarking
 Evaluation against a standard
 Spheres of security - Generalized foundation of a good security
framework
 Controls -Implemented between systems and the information,
between networks and the computer systems, and between the
Internet and internal networks
 Information security - Designed and implemented in three layers:
policies, people (education, training, and awareness programs), and
technology
Spheres of
Security
Security
Education,
Training, and
Awareness
Program
 Education, training, and awareness (SETA) program
 Responsibility of the CISO
 Control measure designed to reduce the incidences of accidental
security breaches by employees
 Designed to supplement the general education and training
programs
Purpose of
SETA
 The Program Elements:
 Security education
 Provide Opportunity , Inform
 TheWhy
 Security training
 Hands-on Education and Experience
 The How
 Security awareness
 Reinforce
 TheWhat
 Purpose of SETA is to enhance security by:
 Improving awareness of the need to protect system resources
 Developing skills and knowledge so computer users can perform
their jobs more securely
 Building in-depth knowledge, as needed, to design, implement, or
operate security programs for organizations and systems
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
Security
Awareness
Example
DTCC’sOwn
Newsletter
Summary
 Policy
 Basis for all information security planning, design, and deployment
 Security team develops a design blueprint used to implement the
security program
 Implement a security education, training, and awareness (SETA)
program
 Supplement the general education and training programs

Más contenido relacionado

La actualidad más candente

IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptxGulnurAzat
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overviewJulia Urbina-Pineda
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information securityjayashri kolekar
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Edureka!
 
Security risk management
Security risk managementSecurity risk management
Security risk managementG Prachi
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy Dam Frank
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023PECB
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)MetroStar
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification PresentationDerroylo
 

La actualidad más candente (20)

IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
The CIA triad.pptx
The CIA triad.pptxThe CIA triad.pptx
The CIA triad.pptx
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security management system (isms) overview
Information security management system (isms) overviewInformation security management system (isms) overview
Information security management system (isms) overview
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Information security
Information securityInformation security
Information security
 
Information Security Governance and Strategy
Information Security Governance and Strategy Information Security Governance and Strategy
Information Security Governance and Strategy
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
Information security
Information securityInformation security
Information security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Information Security
Information SecurityInformation Security
Information Security
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Data Classification Presentation
Data Classification PresentationData Classification Presentation
Data Classification Presentation
 

Similar a Security Policies and Standards

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practicesphanleson
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docxdurantheseldine
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managGrazynaBroyles24
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Bonagiri Rajitha
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security BlueprintZefren Edior
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxManushiKhatri
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At MicrosoftMark J. Feldman
 

Similar a Security Policies and Standards (20)

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Ch09 Information Security Best Practices
Ch09 Information Security Best PracticesCh09 Information Security Best Practices
Ch09 Information Security Best Practices
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
Chapter003
Chapter003Chapter003
Chapter003
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Information Security Blueprint
Information Security BlueprintInformation Security Blueprint
Information Security Blueprint
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptx
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
II Security At Microsoft
II Security At MicrosoftII Security At Microsoft
II Security At Microsoft
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 

Más de primeteacher32

Más de primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Último

Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Pooja Nehwal
 
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...amitlee9823
 
Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negronnegronf24
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boodykojalkojal131
 
Get To Know About "Lauren Prophet-Bryant''
Get To Know About "Lauren Prophet-Bryant''Get To Know About "Lauren Prophet-Bryant''
Get To Know About "Lauren Prophet-Bryant''Lauren Prophet-Bryant
 
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...ranjana rawat
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳anilsa9823
 
Presentation on Workplace Politics.ppt..
Presentation on Workplace Politics.ppt..Presentation on Workplace Politics.ppt..
Presentation on Workplace Politics.ppt..Masuk Ahmed
 
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)sonalinghatmal
 
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...amitlee9823
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxsportsworldproductio
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)amitlee9823
 
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...amitlee9823
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceanilsa9823
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectPriyanshuRawat56
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理cowagem
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjLewisJB
 

Último (20)

Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
Dombivli Call Girls, 9892124323, Kharghar Call Girls, chembur Call Girls, Vas...
 
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Btm Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Personal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando NegronPersonal Brand Exploration - Fernando Negron
Personal Brand Exploration - Fernando Negron
 
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big BoodyDubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
Dubai Call Girls Demons O525547819 Call Girls IN DUbai Natural Big Boody
 
Get To Know About "Lauren Prophet-Bryant''
Get To Know About "Lauren Prophet-Bryant''Get To Know About "Lauren Prophet-Bryant''
Get To Know About "Lauren Prophet-Bryant''
 
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In East Of Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Bidadi Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
Book Paid Saswad Call Girls Pune 8250192130Low Budget Full Independent High P...
 
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service  🧳
CALL ON ➥8923113531 🔝Call Girls Husainganj Lucknow best Female service 🧳
 
Presentation on Workplace Politics.ppt..
Presentation on Workplace Politics.ppt..Presentation on Workplace Politics.ppt..
Presentation on Workplace Politics.ppt..
 
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
Toxicokinetics studies.. (toxicokinetics evaluation in preclinical studies)
 
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
Nandini Layout Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangal...
 
Joshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptxJoshua Minker Brand Exploration Sports Broadcaster .pptx
Joshua Minker Brand Exploration Sports Broadcaster .pptx
 
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
Call Girls Bidadi ☎ 7737669865☎ Book Your One night Stand (Bangalore)
 
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Devanahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jayanagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Nishatganj Lucknow best sexual service
 
Zeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effectZeeman Effect normal and Anomalous zeeman effect
Zeeman Effect normal and Anomalous zeeman effect
 
OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理OSU毕业证留学文凭,制做办理
OSU毕业证留学文凭,制做办理
 
Production Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbjProduction Day 1.pptxjvjbvbcbcb bj bvcbj
Production Day 1.pptxjvjbvbcbcb bj bvcbj
 

Security Policies and Standards

  • 2. Introduction  Organization  Collection of people working together toward a common goal  Must have clear understanding of the rules of acceptable behavior  Policy  Conveys management’s intentions to its employees  Effective security program  Use of a formal plan to implement and manage security in the organization
  • 3. Policies, Standards, and Procedures  Policy  Set of guidelines or instructions  Organization’s senior management implements  Idea  Standards  More detailed descriptions of what must be done to comply with policy  Specifics and outline  Procedures  How to accomplish the policies and standards
  • 4. Effective Policies  For a policy to be considered effective and legally enforceable:  Dissemination  Distribution of the information  Is it in a readily available place?  Review  Has it been read?  Who is reading it?  Comprehension  Is it understandable?  Too confusing?  Compliance  Acknowledge vs. Agree  Uniform enforcement  How are violations being handled?
  • 5. What Drives Policy Development?  Mission of an organization  Written statement of purpose of organization  Usually Not Modified  Vision of an organization  Witten statement of the organization’s long-term goals  Occasionally Modified  Strategic planning  Process of moving the organization toward its vision.  Constantly Reworked to promote progress  Security policy  Set of rules that protects an organization’s assets  Question:What are some security policies you are aware of?
  • 6. Types of Information Security Policies  Information security policy  Set of rules for the protection of an organization’s information assets  Enterprise information security policies  General security policy  Issue-specific security policies  Specific technology policy  Systems-specific security policies  Configurations
  • 7. Enterprise Information Security Policy (EISP)  Supports the mission, vision, and direction of the organization  Sets the strategic direction, scope, and tone for all security efforts  Executive-level document  Drafted by organization’s chief information officer  Expresses the security philosophy within the IT environment  Guides the development, implementation, and management of the security program  Address an organization’s need to comply with laws and regulations in two ways:  General compliance  Identification of specific penalties and disciplinary actions
  • 9. Issue-Specific Security Policy (ISSP)  Addresses specific areas of technology  Requires frequent updates  Contains a statement on the organization’s position on a specific issue  May cover:  Use of company-owned networks and the Internet  Use of telecommunications technologies (fax and phone)  Use of electronic mail  Specific minimum configurations of computers to defend against worms and viruses  Prohibitions against hacking or testing organization security controls  Home use of company-owned computer equipment  Use of personal equipment on company networks  Use of photocopy equipment
  • 11. Systems- Specific Policy (SysSP)  Appear with the managerial guidance expected in a policy  Include detailed technical specifications not usually found in other types of policy documents  Managerial Guidance SysSPs  Guide the implementation and configuration of a specific technology  Technical Specifications SysSPs  General methods for implementing technical controls  Access control lists  Set of specifications that identifies a piece of technology’s authorized users and includes details on the rights and privileges those users have on that technology  Access control matrix  Combines capability tables and ACLs  Configuration rules  Specific instructions entered into a security system to regulate how it reacts to the data it receives  Rule-based policies  More specific to a system’s operation than ACLs  May or may not deal with users directly
  • 12. Frameworks and Industry Standards  Security blueprint  Basis for the design, selection, and implementation of all security program elements  Security framework  Outline of the overall information security strategy  Roadmap for planned changes to the organization’s information security environment  The ISO 27000 Series  NIST Model
  • 13. NISTSecurity Models  Computer Security Resource Center (CSRC) publications  SP 800-14: Generally Accepted Principles and Practices for Securing InformationTechnology Systems  Lists the principles and practices to be used in the development of a security blueprint  SP 800-41 Rev. 1: Guidelines on Firewalls and Firewall Policy  Provides an overview of the capabilities and technologies of firewalls and firewall policies  SP 800-53 Rev. 3: Recommended Security Controls for Federal Information Systems and Organizations  Describes the selection and implementation of security controls for information security to lower the possibility of successful attack from threats  SP 800-53 A, Jul 2008: Guide for Assessing the Security Controls in Federal Information Systems: Building Effective Security Assessment Plans  Provides a systems developmental lifecycle approach to security assessment of information systems
  • 15. Benchmarking and Best Practices  Best practices  Procedures that are accepted or prescribed as being correct or most effective  Benchmarking  Evaluation against a standard  Spheres of security - Generalized foundation of a good security framework  Controls -Implemented between systems and the information, between networks and the computer systems, and between the Internet and internal networks  Information security - Designed and implemented in three layers: policies, people (education, training, and awareness programs), and technology
  • 17. Security Education, Training, and Awareness Program  Education, training, and awareness (SETA) program  Responsibility of the CISO  Control measure designed to reduce the incidences of accidental security breaches by employees  Designed to supplement the general education and training programs
  • 18. Purpose of SETA  The Program Elements:  Security education  Provide Opportunity , Inform  TheWhy  Security training  Hands-on Education and Experience  The How  Security awareness  Reinforce  TheWhat  Purpose of SETA is to enhance security by:  Improving awareness of the need to protect system resources  Developing skills and knowledge so computer users can perform their jobs more securely  Building in-depth knowledge, as needed, to design, implement, or operate security programs for organizations and systems
  • 25. Summary  Policy  Basis for all information security planning, design, and deployment  Security team develops a design blueprint used to implement the security program  Implement a security education, training, and awareness (SETA) program  Supplement the general education and training programs

Notas del editor

  1. Security Education Investigate available courses from local institutions of higher learning or continuing education Centers of Excellence program Identifies outstanding universities that have both coursework in information security and an integrated view of information security in the institution itself 4th grade cyber security training Security Training Provides detailed information and hands-on instruction to employees to prepare them to perform their duties securely Industry training conferences and programs offered through professional agencies SETA resources Offer assistance in the form of sample topics and structures for security classes Security Awareness Designed to keep information security at the forefront of users’ minds Include newsletters, security posters, videos, bulletin boards, flyers, and trinkets