Chapter 4: Security Policy Documents & Organizational Security Policies.

Slides:



Advertisements
Similar presentations
IT Security Policy Framework
Advertisements

Fashion Businesses Fashion Marketing.
Increasing public concern about loss of privacy Broad availability of information stored and exchanged in electronic format Concerns about genetic information.
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
HIPAA Security Rule Overview and Compliance Program Presented by: Lennox Ramkissoon, CISSP The People’s Hospital HIPAA Security Manager The Hospital June.
Chapter 5: Asset Classification
Security Controls – What Works
Information Security Policies and Standards
Developing a Records & Information Retention & Disposition Program:
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Information Systems Security Officer
IT Security Challenges In Higher Education Steve Schuster Cornell University.
Entrepreneurship: Ideas in Action 5e © 2011 Cengage Learning. All rights reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible.
Chapter 6: Personnel Security. 2 Objectives  Describe the role of security in personnel practices  Develop secure recruiting & interviewing procedures.
Chapter 7 Database Auditing Models
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Vendor Risk: Effective Management is Essential
Internal Auditing and Outsourcing
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Security Awareness Norfolk State University Policies.
SEC835 Database and Web application security Information Security Architecture.
INFORMATION SECURITY REGULATION COMPLIANCE By Insert name dd/mm/yyyy senior leadership training on the primary regulatory requirements,
The Institutionalization of Business Ethics
Electronic Records Management: What Management Needs to Know May 2009.
Company Confidential How to implement privacy and security requirements in practice? Tobias Bräutigam, OTT Senior Legal Counsel, Nokia 8 October
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1 DOE IMPLEMENTATION WORKSHOP ASSESSING MY EMS Steven R. Woodbury
Issues in Corporate Governance: Board Structures and Functions Based on a Student Presentation by Joshua Shullaw and Matthew Domeyer.
1 GOVERNANCE in COMMUNITY ORGANISATIONS Community Solutions- NESB Community Safety Development and Coordination Project Auspiced by Illawarra Forum Inc.
HOTLINE: The Value of internal Audit at Georgia Tech 1 Department of Internal Auditing.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 7 Database Auditing Models.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
© Dr. John T. Whiting All Rights Reserved Slide 1 Achieving Compliance with GBLA & Other Laws and Regulations Impacting.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
Working with HIT Systems
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved.McGraw-Hill/Irwin.
Placing Information Security within an Organization
Compliance August 18, Agenda Outline Status Draft of Answers.
Information Security IBK3IBV01 College 3 Paul J. Cornelisse.
IT Security Challenges In Higher Education Steve Schuster Cornell University Copyright Steve Schuster This work is the intellectual property of.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Alex Ezrakhovich Process Approach for an Integrated Management System Change driven.
The Health Insurance Portability and Accountability Act of 1996 “HIPAA” Public Law
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Department of Computer Science Introduction to Information Security Chapter 8 ISO/IEC Semester 1.
1 HIPAA’s Impact on Depository Financial Institutions 2 nd National Medical Banking Institute Rick Morrison, CEO Remettra, Inc.
Developing a Business Plan Why a Business Plan is Important What Goes into a Business Plan? How to Create an Effective Business Plan.
(3.6) General requirements on resources for the establishment of IMS
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
IS4680 Security Auditing for Compliance
Построение культуры integrity в компании Aнар Каримов партнёр «ЭКВИТА»
Chapter 3: IRS and FTC Data Security Rules
IS4680 Security Auditing for Compliance
Communication and Consultation with Interested Parties by the RB
IS4550 Security Policies and Implementation
CompTIA Security+ Study Guide (SY0-401)
IS4680 Security Auditing for Compliance
IS4680 Security Auditing for Compliance
IT-audit case PEMPAL, Skopje, April 2019.
Presentation transcript:

Chapter 4: Security Policy Documents & Organizational Security Policies

2 Objectives  Compose a statement of authority  Develop and evaluate policies related to the information security policies documents objectives and ownership  Create and asses policies associated with the management of security-related activities  Assess and manage the risks inherent in working with third parties

3 Composing a Statement of Authority  The statement should be issued by an authority figure such as a CEO, President… Buy-in from top management is a must It provides adequate credibility to the policy for all employees

4 Composing a Statement of Authority Cont. The statement is an introduction to the policy  It sets the tone for the document Statement of authority & statement of culture  Exposes the values of the company and security measures to be deployed to protect them An attempt at “recruiting” employees to act in a secure fashion to protect the company

5 Composing a Statement of Authority Cont. The goal of the statement of authority: to deliver a clear message about the importance of information security for all employees  If the message is not clear, employees will either act erroneously by mistake or will disregard the whole document altogether The statement is a teaching tool  It should be created, promoted and used as such

6 Composing a Statement of Authority Cont. The statement should reflect the company culture in both format and content  Information security is first and foremost cultural and behavioral  Employees need to identify and embrace with the company culture  It is made easier if the documents that are part of the security policy are clearly in accordance with the company policy

7 Security Policy Document Policy  States the need for written information security policies as well as who is responsible for creating, approving, enforcing & reviewing policies These responsibilities must be clearly stated in the document so that no phase of the process is “abandoned” or ignored Strong leadership is always a part of successful information security policies

8 Security Policy Document Policy Cont. Emphasizes management’s approach and commitment to information security  No Information policy can be successful without full and unequivocal support from Management It’s a policy about needing and having policies!

9 Federal Law & Information Security Policy  Many private sector industries are federally regulated: Financial Sector:  GLBA (Gramm-Leach-Bliley Act)  SOX (Sarbanes-Oxley, which affects publicly-traded companies) Healthcare:  HIPAA (Health Insurance Portability & Accountability Act Educational Institutions:  FERPA (Family Educational Rights & Privacy Act)

10 Federal Law & Information Security Policy Cont. Some organizations may fall under several federal mandates  If necessary, companies should hire 3 rd -party experts to identify under which mandates a company falls ISO can be mapped to several federal mandate regulations  Here again, it may be advantageous to hire 3 rd - party compliance experts to guide and support the company’s compliance team

11 Security Policy Document Policy Cont. The Information Security Policy Document policy should reference federal and state regulations to which the organization is subject  It is important to integrate those regulations in the policies written for and deployed by the company  The first step towards compliance is awareness!

12 The Need for an Employee Version of the Security Policies  Whole document can be too complex & intimidating The goal is to create a guide of what is acceptable and what is not. Making the document too complex defeats that purpose  The goal is for employees to read, understand and act according to the policies The policies are useless without adequate employee support

13 The Need for an Employee Version of the Security Policies Cont. Employees should only be given those policies that apply to them  Need-to-know and the concept of least privilege apply here as well! Acceptable Use Agreement should be drafted and distributed to all employees  It should include (but is not limited to): An Internet use policy An use policy

14 The Need for an Employee Version of the Security Policies Cont. Remind all employees that information cannot be protected if they don’t all buy in and adopt the policies that regulate the company  Again, information security is behavioral and cultural  There is no technical device that a company can deploy to protect the confidentiality, integrity and availability of data if employees are not also enrolled in actively protecting the company’s data

15 Policies are Dynamic Organizations change, either directly or indirectly. Their policies must also change to reflect this dynamic situation Scheduled, regular reviews should take place  Change drivers are events within an organization that affect culture, procedures, activities, responsibilities, and more Change drivers must be identified and analyzed

16 Policies are Dynamic Cont. Change drivers may introduce new activities and/or vulnerabilities  Identified change drivers should trigger new risk & vulnerability assessments  Companies should also have regularly scheduled risk and vulnerability assessments  For separation of duties purposes, vulnerability assessments should be conducted by 3 rd -party consultants

17 Policies are Dynamic Cont. Who is responsible for this document?  The ISO, or a member of Upper Management What “ownership” means:  Developing, maintaining & reviewing policies Policy owner does not approve policies. A higher level of the company is responsible. Information Security Policy Document defines both ownership and authority

18 Policies are Dynamic Cont. Decisions should include:  Who is in charge of security management?  What is the scope of their enforcement authority?  When should third-party expertise be brought in?

19 Managing Organizational Security Three topics on which to focus:  Information Security Infrastructure  Identification of risks from 3 rd -party consultants  Security Requirements for outsourcing

20 Managing Organizational Security Cont. Designing & maintaining a secure environment requires input from representatives of each department of the company:  Management  IT (developers, network engineers, administrators)  HR  Legal & Financial services Collaboration of all these parties is required to create and maintain a successful information security policy

21 Managing Organizational Security Cont. Designing & maintaining a secure environment requires input from representatives of each department of the company:  Management  IT (developers, network engineers, administrators)  HR  Legal & Financial services

22 Managing Organizational Security Cont. Who is a third-party?  Business partners  Vendors  Contractors (including temporary workers)

Managing Organizational Security Cont. Physical Security  Protecting the network from attacks from the outside is recommended, but a company should not forget to protect the physical security of the servers Why bother to hack when you can steal?

24 Managing Organizational Security Cont. If physical access for 3 rd -party is allowed, proper control must be deployed to:  Select who gets physical access  To which areas is physical access granted  Has due diligence been extended to verify the integrity and credibility of those 3 rd -party contractors?

25 Outsourcing Is a Growing Trend  Outsourcing is seen by some as a business tool used to lower costs. It also comes with risks: Is the work being outsourced out of the country?  If so, to which country?  How is security handled in the culture of that country?  How effectively are Intellectual Property laws enforced and respected in that country?

26 Outsourcing Is a Growing Trend Cont.  Is the data secure during transmission? Is the data transferred electronically?  What secure protocols are used? Is the data physically sent overseas?  What courier system is used?  How reliable/reputable/dependable is this courier system?

27 Outsourcing Is a Growing Trend Cont.  Is the data securely stored while away from the corporate network? What security controls are deployed at the periphery of the target network? What access control methods are used on the target control? What auditing methods are used on the target network?

28 Outsourcing Is a Growing Trend Cont.  How do you conduct due diligence on a company located halfway across the world? Is this company foreign-owned, or a subsidiary of a US- owned corporation? Is this company reputable? Has the company sent a representative on-site to verify the information provided to them?

29 Summary  Standards such as the ISO exist to help organizations better define appropriate ways to protect their information assets.  Written policies are not enough, and the proper security infrastructures must be deployed.  A multidisciplinary approach to security that involves all departments will result in a unified security posture that can be adopted by the whole company.  Because companies are not static, also must policies evolve with the company. In order to achieve a higher level of protection, it is recommended that companies would hire security experts.