IS4550 Security Policies and Implementation

Slides:



Advertisements
Similar presentations
How Will it Help Me Do My Job?
Advertisements

Module N° 4 – ICAO SSP framework
Radiopharmaceutical Production
USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
Overview of Priorities and Activities: Shared Services Canada Presentation to the Information Technology Infrastructure Roundtable June 17, 2013 Liseanne.
Chapter 10 Accounting Information Systems and Internal Controls
ORGANIZATION. 2 Purchasing & Inventory Assessment Occurrence Management Information Management Process Improvement Customer Service Facilities & Safety.
Security Controls – What Works
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
© 2006 IBM Corporation Introduction to z/OS Security Lesson 9: Standards and Policies.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Information Systems Controls for System Reliability -Information Security-
Project Governance Structure
COSO Framework Update IIA Columbus Chapter May 17, 2013
Internal Auditing and Outsourcing
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Creating an Effective Policy Central Missouri Chapter Jesse Wilkins April 16, 2009.
NIST Special Publication Revision 1
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Roles and Responsibilities
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
Module N° 8 – SSP implementation plan. SSP – A structured approach Module 2 Basic safety management concepts Module 2 Basic safety management concepts.
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
Chapter 8 Auditing in an E-commerce Environment
Information Resource Stewardship A suggested approach for managing the critical information assets of the organization.
Copyright © 2007 Pearson Education Canada 9-1 Chapter 9: Internal Controls and Control Risk.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Review of IT General Controls
Sample Fit-Gap Kick-off
IS4550 Security Policies and Implementation
Software Configuration Management
IS4550 Security Policies and Implementation Unit 7 Risk Management
IS4680 Security Auditing for Compliance
ServiceNow Implementation Knowledge Management
Responsibilities & Tasks Week 2
Training Course on Integrated Management System for Regulatory Body
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
COSO Internal Control s Framework
IS4550 Security Policies and Implementation Unit 5 User Policies
IS4550 Security Policies and Implementation
HIPAA Implementation Strategies for Compliance Professionals
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
IS4680 Security Auditing for Compliance
IS4550 Security Policies and Implementation
Building Changes’ Strategic Business Planning Process
HIPAA Implementation Strategies for Compliance Professionals
IS4550 Security Policies and Implementation
IS4680 Security Auditing for Compliance
Cybersecurity ATD technical
IS4680 Security Auditing for Compliance
Roles and Responsibilities
IS4680 Security Auditing for Compliance
Employee engagement Delivery guide
Objectives Describe the purposes of the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009 Explore how the HITECH Act.
Internal Audit Who? What? When? How? Why? In brief . . .
Security Policies and Implementation Issues
Radiopharmaceutical Production
Security Policies and Implementation Issues
Portfolio Committee on Communications
Marketing Planning Meeting Periodic Marketing Review
Presentation transcript:

IS4550 Security Policies and Implementation Unit 3 Policies, Standards, Procedures, and Guidelines

Class Agenda 6/30/16 Lesson Covers Chapter 6 and 7 Learning Objectives 11/28/2018 Class Agenda 6/30/16 Lesson Covers Chapter 6 and 7 Learning Objectives Lesson Presentation and Discussions. Discussion on Assignments. Discussion on Lab Activities. Break Times as per School Regulations. Try to read the text book before class. Make Up Class for IS4680: Discussion (c) ITT Educational Services, Inc.

Learning Objective Describe the components and basic requirements for creating a security policy framework.

Key Concepts Key building blocks of security policy framework Types of documents for a security policy framework Information systems security (ISS) and information assurance considerations Process to create a security policy framework Best practices for policy management and maintenance

Information Security Framework and Controls Policy Standards Procedures Guidelines Defines how an organization performs and conducts business functions and transactions with a desired outcome. An established method implemented organization-wide. Steps required to implement a process. A parameter within which a policy, standard, or procedure is suggested.

Information Systems Security and Information Assurance Protecting information during processing and use The 5 Pillars Implementation of appropriate accounting and other integrity controls Development of systems that detect and thwart attempts to perform unauthorized activity ISS Protecting information and the systems that store and process the information Automation of security controls, where possible Assurance of a level of uptime of all systems Security Policy Framework

Three Areas of policy planning and implementation. Creating security policy Changing security policy Maintaining security

Creating security policy Information security policies provide vital support to security professionals, yet few organizations take the time to create decent policies Many organizations just download examples from the web and cut and paste as they see fit. But this create problems later on ie: Vulnerabilities .

Process to Create a Security Policy Framework Case Study Private Sector HealthCare w/7000 devices Incomplete Inventory No easy way to classify assets Health Insurance Portability and Accountability Act (HIPPA) Used NIST SP 800-53 to establish the framework Public Sector State of Tennessee Used ISO/IEC 17799 (27002) Policies and frameworks covered all information asset owned, leased, or controlled by the State of Tennessee Critical Infrastructure Protection Verizon Inc. The network stopped working and the financial markets stopped operating as well 85% of network was privately held Used National Infrastructure Protection Plan (NIPP) framework

A good policy Should be: Short as possible Relevant to the audience Aligned to the needs of the business Aligned to the legislation and regulatory frameworks in which you operate Should add value to the employee and the overall outcomes and behaviors you are looking to promote

Policy Framework-Outline The typical information security policy may have the following headings: Document Control Document Location Revision History Approvals Distribution Document History

Policy Framework-Outline (Cont.) Enquiries Introduction and Purpose Scope Your Responsibilities Our Responsibilities Where to find more information Equal Opportunities Impact Assessment

Members of the Policy Change Control Board Possible Members come from functional areas of the organization and include (in random order): Information Security Compliance Management Auditing Human Resources (HRs) Leadership from the key information business units Project Managers (PMs)

Members of the Policy Change Control Board (Continued) The roles for each member would be to approve changes to the policies, reflecting alignment to business objectives Each functional area oversee policies pertaining to their perspective area of responsibility, while they also play a role in the approval of policy changes that effect the organization as a whole

Policy Change Control Board Assess policies and standards and make recommendations for change Coordinate requests for change (RFC’s) Ensure that changes to existing policies and standards support the organization’s mission and goals Review requested changes to the policy framework Establish a change management process for policies and standards

Best Practices for Policy Maintenance Updates and revisions Exceptions and waivers Request from users and management Changes to the organization

External and Internal Factors Affecting Policies Policies must align with the business model or objective to be effective External factors: Regulatory and governmental initiatives Internal factors: Culture, support, and funding

Summary In this presentation, the following were covered: Considerations for information assurance and information security Process to create a security policy framework Policy change control board and its members Factors that affect polices and the best practices to maintain policies

Unit 3 Discussion and Assignments Discussion 3.1 Business Considerations Assignment 3.3 Security Policy Frameworks

Unit 3 Lab Activities Lab is in the lab manual on line Lab 3.2 Define an Information Systems Security Policy Framework for an IT Infrastructure Reading assignment: Read chapter 6 and 7

Class Project Unit 3:Team member list and initial team meeting-draft should be submitted. Unit 4: Research on DoD specific requirements, and any problems, or questions - Draft. Deliverables or milestone drafts as specified in the project content will be submitted. Due on Week 11