Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.

Slides:



Advertisements
Similar presentations
Copyright © XiSEC, All rights reserved, 2002 Secure Computing Best Lifetime Achievement Award 2002 Ted Humphreys Information Security Management Goes Global.
Advertisements

Dr Lami Kaya ISO Information Security Management System (ISMS) Certification Overview Dr Lami Kaya
IT Web Application Audit Principles Presented by: James Ritchie, CISA, CISSP….
ISMS standards and control processes ISO27001 & ISO27002
Health Insurance Portability and Accountability Act (HIPAA)HIPAA.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
Auditing Computer Systems
ISO Information Security Management
Security Controls – What Works
Information Security Policies and Standards
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Session 3 – Information Security Policies
Information Systems Controls for System Reliability -Information Security-
CAMP Med Mapping HIPAA to the Middleware Layer Sandra Senti Biological Sciences Division University of Chicago C opyright Sandra Senti,
Introduction to Network Defense
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Lesson 8-Information Security Process. Overview Introducing information security process. Conducting an assessment. Developing a policy. Implementing.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Evolving IT Framework Standards (Compliance and IT)
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
 Computer security policy ◦ Defines the goals and elements of an organization's computer systems  Definition can be ◦ Highly formal ◦ Informal  Security.
Physical Security By: Christian Hudson. Overview Definition and importance Components Layers Physical Security Briefs Zones Implementation.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
© 2013 Cambridge Technical CommunicatorsSlide 1 ISO/IEC Standard for Information Security Management Systems.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Information Systems Security Operational Control for Information Security.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
Lesson 9-Information Security Best Practices. Overview Understanding administrative security. Security project plans. Understanding technical security.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Working with HIT Systems
Site Security Policy Case 01/19/ : Information Assurance Policy Douglas Hines, Jr.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
ISO/IEC 27001:2013 Annex A.8 Asset management
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Information Security Framework Regulatory Compliance and Reporting Auditing and Validation Metrics Definition and Collection Reporting (management, regulatory,
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Contingency Management Indiana University of Pennsylvania John P. Draganosky.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
HR SECURITY  EGBERT PESHA  ALLOCIOUS RUZIWA  AUTHER MAKUVAZA  SAKARIA IINOLOMBO
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Information Security Management Goes Global
INFORMATION SYSTEMS SECURITY AND CONTROL.
Magister Sistem Informasi UNIKOM
Cybersecurity Policies & Procedures ICA
IS4680 Security Auditing for Compliance
Introduction to the Federal Defense Acquisition Regulation
Lecture 14: Business Information Systems - ICT Security
Managing the IT Function
Information Security: Risk Management or Business Enablement?
I have many checklists: how do I get started with cyber security?
Final HIPAA Security Rule
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
County HIPAA Review All Rights Reserved 2002.
INFORMATION SYSTEMS SECURITY and CONTROL
How to Mitigate the Consequences What are the Countermeasures?
Physical Security.
IS4680 Security Auditing for Compliance
Presentation transcript:

Network Security Policy Anna Nash MBA 737

Agenda Overview Goals Components Success Factors Common Barriers Importance Questions

Overview A Network Security Policy:  Provides rules for access to and proper use of computer and network resources  Defines procedures to prevent and respond to improper use of network components, including associated data and systems

Goals The goal of Network Security Policy is to:  Strategically align network controls with enterprise business objectives in a value added fashion  Provide the appropriate mechanisms for effectively managing risk related to the network infrastructure and network-accessible assets  Provide the metrics needed to ensure that network security risks are appropriately mitigated and access policies effectively followed

Components Network security policies are subjective, developed to meet the specific goals and risks of each individual organization However, there are components common to all successful network security policies, including:  Asset Management  HR Security  Physical Security  Communications/Operations Management  Access Control  Software Security  Incident Management  Business Continuity Management  Compliance

Components: Asset Management Asset Management is the set of policies and procedures designed to protect organizational assets Assets include information, software assets, physical assets, people and intangibles such as reputation Typical Asset Management Policies include:  Inventory  Ownership Assignment  Defined Acceptable Use

Components: HR Security HR Security is the set of policies and procedures designed to ensure employees, contractors and third party users understand their responsibilities and are an appropriate fit for their role(s) within the organization. HR policies can be targeted to different timeframes  Prior to employment  During employment  Termination / Change of employment Typical HR Security Policies include:  Screening / Background Checks  Security Awareness Training  Disciplinary Processes  Termination Responsibilities  Removal of Access Rights

Components: Physical Security Physical Security is the set of policies and procedures designed to prevent unauthorized physical access, damage and interference to the organization’s physical premises and information Should also prevent loss or theft of physical assets Typical Physical Security Policies include:  Physical entry policies  Security of offices, rooms and facilities  Equipment maintenance procedures  Security of equipment off-premises  Disposal or removal of property

Components: Communications/Operations Mgt. Communications and Operations Management policies and procedures are designed to ensure the correct and secure operation of IT facilities This encompasses a broad set of controls including:  Malicious code protection  Back-Ups  Network Controls  Handling and Disposal of removable media  Protection of information exchange including  Protection of on-line transactions  Logging and Monitoring of systems to record security events

Components: Access Control Access Control policies and procedures are designed to control access to the organization’s information Access Control policies typically include:  User access management  User permission management  Password management  Reviews of access  Authentication mechanisms  Network separation and associated controls  Telework controls and restrictions

Components: Software Security Software security policies and procedures are designed to ensure security is an integral part of IT systems (both those systems provided by third parties, and those developed in-house) Typical Software Security policies include:  Security requirements  Input data validation  Output validation  Integrity Checks  Encryption Requirements  Change Control  Security Patching / Vulnerability Management

Components: Incident Management Incident Management policies and procedures are designed to ensure that security events are discovered, communicated and corrected in a timely manner Typical Incident Management policies include:  Reporting of events  Reporting of vulnerabilities and weaknesses  Incident Handling and Recovery  Reporting of lessons learned after incidents

Components: Business Continuity Management Business Continuity Management policies and procedures are designed to minimize the impact of system failures or disasters and to ensure timely recovery of critical systems Scope includes both preventative and recovery controls Organization must understand the business impact of failures and disasters prior to formulating policies for prevention and recovery Typical Business Continuity Management policies include:  Scope definition (requirements for critical business continuity)  Continuity Plan  Testing and maintenance of plan

Components: Compliance Compliance policies and procedures are designed to help the organization avoid breaches of any relevant laws or regulatory requirements. Should also focus on avoiding contractual breaches and security requirements or policy violations Typical Compliance policies include:  Documentation of applicable legislation  Data protection (organization trade secrets, private personal information)  Information System Audit controls

Network Security Policy: Success Criteria The success of a Network Security Policy is directly related to:  Policy’s alignment with business objectives  Support from management  Employee awareness & acceptance of policy  Enforceability of the policy  Corporate dedication to treat the policy as a living document

Network Security Policy: Common Barriers Barriers common to unsuccessful Network Security Policies include:  Lack of funding  Lack of alignment with business objectives and organizational risk  Idiots

Importance The risks surrounding network based operations are increasing:  Cyber attacks are growing both in frequency and severity  There is a growing gap between the rate of technology adoption and the rate of controls adoption  Convergence of technologies has led to a convergence of risk, increasing the potential impact of attaches The dependence on technology, particularly network operations, is similarly increasing

Questions ?