Information Security Policy

Slides:



Advertisements
Similar presentations
CIP Cyber Security – Security Management Controls
Advertisements

Information Security Policy
Information Security Policy
6-1 Full and Fair Reporting Electronic Presentation by Douglas Cloud Pepperdine University Chapter F6.
Information Security Policies and Standards
Each problem that I solved became a rule which
Computer Security: Principles and Practice
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Network security policy: best practices
Information Security Policy
@ Industrial Engineering by Bopaya Bidanda David I. Cleland.
CSE 4482: Computer Security Management: Assessment and Forensics
Internal Auditing and Outsourcing
Guide to Firewalls and VPNs, 3rd Edition
SEC835 Database and Web application security Information Security Architecture.
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Copyright Course Technology 1999
ITC358 ICT Management and Information Security
TEL2813/IS2820 Security Management
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
INFORMATION SECURITY & RISK MANAGEMENT SZABIST – Spring 2012.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
MANAGEMENT of INFORMATION SECURITY Second Edition.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 4 I NFORMATION S ECURITY P OLICY Each problem that I solved became a rule which served afterwards.
Developing Plans and Procedures
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Environmental Management System Definitions
1 Chapter Nine Conducting the IT Audit Lecture Outline Audit Standards IT Audit Life Cycle Four Main Types of IT Audits Using COBIT to Perform an Audit.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 4 I NFORMATION S ECURITY P OLICY Each problem that I solved became a rule which served afterwards.
SecSDLC Chapter 2.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 4 Security Policy, Standard, and Practices.
Information Security Policy
The NIST Special Publications for Security Management By: Waylon Coulter.
Slide 1 INFORMATION SECURITY POLICY  ” Avoiding danger is no safer in the long run than exposure”. Helen Keller  “Anyone who has never made a mistake,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Security Policy Development for Management By Peter McCarthy.
1.  1. Introduction  2. Policy  3. Why Policy should be developed.  4. www policies 2.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
INFORMATION SECURITY MANAGEMENT L ECTURE 5: D EVELOPING THE S ECURITY P ROGRAM You got to be careful if you don’t know where you’re going, because you.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
 P lanning is an intellectual process, consicous determination of courses of action, the basing of decisions on purpose, facts and considered estimates.
CHAPTER 2 SYSTEM PLANNING DFC4013 System Analysis & Design.
By Marc-André Léger DESS, MASc, PHD(candidate)
MANAGEMENT of INFORMATION SECURITY Second Edition.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Fundamentals of Information Systems, Sixth Edition
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
TechStambha PMP Certification Training
IS4680 Security Auditing for Compliance
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 7 – Organisational Systems Security
Foundations of Planning
Systems Analysis and Design
Continuity Guidance Circular Webinar
Chapter 8 Developing an Effective Ethics Program
Cyber security Policy development and implementation
HIPAA Security Standards Final Rule
Security Policy and Standards
Copyright © 2005 Prentice Hall, Inc. All rights reserved.
Security Policies and Implementation Issues
{Project Name} Organizational Chart, Roles and Responsibilities
Radiopharmaceutical Production
Security Policies and Implementation Issues
OU BATTLECARD: Oracle Identity Management Training
Basic Systems Management Employing Security Policies
Presentation transcript:

Information Security Policy INFORMATION SECURITY MANAGEMENT Lecture 4: Information Security Policy

Principles of Information Security Management Include the following characteristics that will be the focus of the current course (six P’s): Planning Policy Programs Protection People Project Management Chapters 2 & 3 Chapter 4 http://csrc.nist.gov/publications/PubsTC.html

Introduction “The success of an information resources protection program depends on the policy generated, and on the attitude of management toward securing information on automated systems” Policy is the essential foundation of an effective information security program

Policy Explains the will of the organization’s management in controlling the behavior of employees

Policy – Biggest Threat to Endpoint Security? 78% consider negligent or careless employees who do not follow security policies to be biggest threat to endpoint security 50% did not receive any security or policy awareness training "I wouldn’t go so far to say they don’t care – mostly - but I’d also point out that organizations probably haven’t done a good job of helping them understand why they should care" http://www.securityweek.com/employees-not-following-policy-biggest-threat-endpoint-security-it-pros-say

Bulls-eye Model

Policy, Standards, and Practices Policy & Types Enterprise Issue-specific Systems-specific Standards Practices

Enterprise Information Security Policy (EISP) Sets strategic direction, scope, and tone for organization’s security efforts Assigns responsibilities for various areas of information security Examples: http://uncw.edu/policies/it.html http://it.nc.gov/statewide-resources/policies http://doit.maryland.gov/support/pages/securitypolicies.aspx

EISP Elements Overview of the corporate philosophy on security Information about information security organization and information security roles Responsibilities for security that are shared by all members of the organization Responsibilities for security that are unique to each role within the organization

Example ESIP Components Statement of purpose Information technology security elements Need for information technology security Information technology security responsibilities and roles Reference to other information technology standards and guidelines

Issue-Specific Security Policy (ISSP) Provides detailed, targeted guidance Protects organization from inefficiency and ambiguity Indemnifies the organization against liability for an employee’s inappropriate or illegal system use

Issue-Specific Security Policy (cont’d.) Every organization’s ISSP should: Examples at UNCW: Email Abuse https://ncit.s3.amazonaws.com/s3fs-public/documents/files/Statewide-Acceptable-Use-Policy-1-17.pdf

ISSP - Topics Email and internet use Minimum system configurations Prohibitions against hacking Home use of company-owned computer equipment Use of personal equipment on company networks Use of telecommunications technologies Use of photocopy equipment

Components of the ISSP Statement of Purpose Authorized Access and Usage of Equipment Prohibited Usage of Equipment Systems management Violations of policy Policy review and modification Limitations of liability

Implementing the ISSP Common approaches

System-Specific Security Policy System-specific security policies (SysSPs) frequently do not look like other types of policy SysSPs can be separated into:

Managerial Guidance SysSPs Created by management to guide the implementation and configuration of technology Applies to any technology that affects the confidentiality, integrity or availability of information Informs technologists of management intent Example: Lifecycle Replacement

Technical Specifications SysSPs System administrators’ directions on implementing managerial policy General methods of implementing technical controls Access control lists Configuration rules

Technical Specifications SysSPs (cont’d.) Access control lists Include the user access lists, matrices, and capability tables that govern the rights and privileges Enable administrations to restrict access according to user, computer, time, duration, or even a particular file Examples: Access to Information Resources and Data

Technical Specifications SysSPs (cont’d.) Access control lists regulate: Administrators set user privileges

Guidelines for Effective Policy For policies to be effective, they must be properly:

Developing Information Security Policy It is often useful to view policy development as a two-part project Design and develop the policy (or redesign and rewrite an outdated policy) Establish management processes to perpetuate the policy within the organization

Developing Information Security Policy (cont’d.) Policy development projects should be Well planned Properly funded Aggressively managed to ensure that it is completed on time and within budget The policy development project can be guided by the SecSDLC process

SecSDLC Process of Policy Development Investigation phase Obtain support from senior management Clearly articulate the goals of the policy project Acquire a capable project manager Develop a detailed outline of and sound estimates for project cost and scheduling

Developing Information Security Policy (cont’d.) Analysis phase should produce New or recent risk assessment or IT audit documenting the current information security needs of the organization Key reference materials Including any existing policies

Developing Information Security Policy (cont’d.) Design phase includes How the policies will be distributed How verification of the distribution will be accomplished

Developing Information Security Policy (cont’d.) Implementation phase includes Writing the policies Policy distribution Maintenance Phase Maintain and modify the policy as needed Built-in reporting mechanism Periodic review

Alternative Approaches: The Information Securities Policy Made Easy Approach Gathering key reference materials Defining a framework for policies Preparing a coverage matrix Making critical systems design decisions Structuring review, approval, and enforcement processes

Alternative Approaches: Guide for Developing Security Plans for Federal Information Systems NIST Special Publication 800-18, Rev. 1 reinforces a business process-centered approach to policy management Policies are living documents Good management practices for policy development and maintenance make for a more resilient organization

Alternative Approaches: Guide for Developing Security Plans for Federal Information Systems Policy requirements An individual responsible for reviews A schedule of reviews A method for making recommendations for reviews An indication of policy and revision date Management of Information Security, 3rd ed.

A Final Note on Policy Lest you believe that the only reason to have policies is to avoid litigation, it is important to emphasize the preventative nature of policy.

Technical Specifications SysSPs: Case Study Disaster at a University: A Case Study in Information Security Overview Issue People Involved Approach and Resolution Outcomes Conclusion

Next Class Chapter 5 – Security Programs Case Studies We will be covering the cases during lecture. Be prepared to discuss your assigned case and read the other cases Assessment 1 – 2/15