Security Policies Jim Stracka www.pentasafe.com. The Problem Today.

Slides:



Advertisements
Similar presentations
Technology Center 1600 Training on Writing Rejections Under 35 U.S.C. § 103.
Advertisements

1 Welcome Safety Regulatory Function Handbook April 2006.
Program Management Office (PMO) Design
Radiopharmaceutical Production
Process and Procedure Documentation. Agenda Why document processes and procedures? What is process and procedure documentation? Who creates and uses this.
PRESENTATION ON MONDAY 7 TH AUGUST, 2006 BY SUDHIR VARMA FCA; CIA(USA) FOR THE INSTITUTE OF INTERNAL AUDITORS – INDIA, DELHI CHAPTER.
CIP Cyber Security – Security Management Controls
How are you going to manage?.  Informal  collection of vendors  loosely managed  minimal structure  Informal  collection of vendors  loosely managed.
QA Programs for Local Health Departments
Charles E. Constantin Director, Senior Bank Regulatory Compliance Officer Royal Bank of Canada, RBC Capital Markets Institute of International Bankers.
1 INTERNAL CONTROLS A PRACTICAL GUIDE TO HELP ENSURE FINANCIAL INTEGRITY.
Developing Information Security Policy. Why is Developing Good Security Policy Difficult? Effective Security/IA Policy is more than locking doors and.
9.401 Auditing Chapter 1 Introduction. Definition of Auditing The accumulation and evaluation The accumulation and evaluation Of evidence about information.
IDENTIFYING RISKS AND CONTROLS IN BUSINESS PROCESS
Information Systems Security Officer
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 8: Developing an Effective Ethics Program.
Quality evaluation and improvement for Internal Audit
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Purpose of the Standards
Achieving our mission Presented to Line Staff. INTERNAL CONTROLS What are they?
Six Sigma Black Belt Project Information Prepared: July 20, 2004.
Internal Auditing and Outsourcing
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
An Educational Computer Based Training Program CBTCBT.
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
Chapter 3 Internal Controls.
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
Audit objectives, Planning The Audit
The Audit Process Tahera Chaudry March Clinical audit A quality improvement process that seeks to improve patient care and outcomes through systematic.
Developing an Effective Ethics Program
Chapter Three IT Risks and Controls.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
NO FRAUD LEFT BEHIND The Effect of New Risk Assessment Auditing Standards on Schools Runyon Kersteen Ouellette.
Chapter 3 資訊安全管理系統. 4.1 General Requirements Develop, implement, maintain and continually improve a documented ISMS Process based on PDCA.
Agency Risk Management & Internal Control Standards (ARMICS)
1 Today’s Presentation Sarbanes Oxley and Financial Reporting An NSTAR Perspective.
Principles of Local Governance: Covering local governmental legislations and compliance issues IMFO WOMEN IN LOCAL GOVERNMENT FINANCE CONFERENCE 07/02/13.
Private & Confidential1 (SIA) 13 Enterprise Risk Management The Standard should be read in the conjunction with the "Preface to the Standards on Internal.
The Audit as a Management Tool Vermont State Auditor’s Office – April 2009.
Roadmap For An Effective Compliance And Ethics Program The Top Ten Things the Board Must Know [Name of Presenter] [Title] [Date]
1 Internal Audit. 2 Definition Is an independent activity established by management to examine and evaluate the organization’s risk management processes.
ANTI-MONEY LAUNDERING COMPLIANCE PROGRAM FCM TRAINING
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
1 EMS Fundamentals An Introduction to the EMS Process Roadmap AASHTO EMS Workshop.
Policy Overview Policy Management Practices: A How to Guide & Best Practices.
Forum on Internet of Things: Empowering the New Urban Agenda Geneva, Switzerland, 19 October 2015 Cooperation and Opportunities for Standards in the New.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
1 - 1 Copyright  2003 Pearson Education Canada Inc. CHAPTER 1 An Overview of Auditing and Assurance Services.
ICAJ/PAB - Improving Compliance with International Standards on Auditing Planning an audit of financial statements 19 July 2014.
Copyright © Houghton Mifflin Company. All rights reserved.8-1 Chapter 8 Developing an Effective Ethics Program.
Moving to BYOD Gary Audin 1.
Outcomes of the FMC review Vania Tomeva, PIFC consultant July 2013, Tbilisi 1.
Governance, risk and ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
SUNY Maritime Internal Control Program. New York State Internal Control Act of 1987 Establish and maintain guidelines for a system of internal controls.
Roadmap For An Effective Compliance And Ethics Program
PROGRESS IN IMPLEMENTING e-GOVERNANCE
Agenda What is Corporate Governance?
Information Assurance Policy and Management
Predetermined Objectives – 2013/14
Accountability and Internal Controls – Best Practices
Other Assurance Services
IS4550 Security Policies and Implementation
Chapter 8 Developing an Effective Ethics Program
Cyber security Policy development and implementation
Internal Control Internal control is the process designed and affected by owners, management, and other personnel. It is implemented to address business.
Radiopharmaceutical Production
Presentation transcript:

Security Policies Jim Stracka

The Problem Today

VigilEnt Security Agents VigilEnt Policy Center VigilEnt Security Manager VigilEnt Security Solution

Overwhelming Validation Customers Strategic Alliances Investors

Agenda Business Issues What Is An Information Security Policy ? Policy Development Process Conclusion

Business Issues Organizations Embracing New Business Models Increased Risks In New Economy Environments How Do You Conduct E-Business Safely ? Security Is A BUSINESS Issue Not A Technology Issue Security Must Be Governed By Policy

Why have a Security Policy ? Clearly Establishes Expectations Acts As An Extension Of The Organizations Leadership Opportunity To Address Asset Protection Ensures Proper Compliance With Laws, Regulations etc Ensures Implementation Of Proper Controls Reduces Liability

What is a Policy ? A Policy Defines Expectations Policies Are Written At A High Level Technology Changes, But Policies Rarely Do Your Policy Should Indicate A “Perfect World” (Security Gap)

Policy or Standard? The Rule Process Should Incorporate Two Levels: Policy: Few And Short Statements Sets The Goal Your Trying To Achieve Language Used (Will / Shall) Standard: Gets Much More Specific; To Platform; Technology; Procedure Language Used (Should / Could)

The Problem Today

Anatomy of a Security Policy Elements of a Viable Policy: Policy Statements Purpose Scope Controls Definitions Applicable Entities Roles And Responsibilities References Information Assets

Policy Elements: Policy Statement The Policy Statement is a one or two sentence description of the policy. It describes the control environment, not how the organization will accomplish the objective. Policy Statement

Policy Elements: Purpose The policy Purpose describes the reason for this particular policy (i.e., why it exists). Purpose

Policy Elements: Scope The policy Scope primarily defines who falls under the jurisdiction of the policy. As a further explanation of scope, policy statements should indicate who must observe the policies and when it may be acceptable for worker actions or activities to be inconsistent with policies. Scope

Policy Elements: Information Assets Integral element of any security policy Not likely restated for each policy statement However, it is important to identify for each policy statement if there are any specific inclusions or exclusions to this information (this is most effectively done on a class basis) Examples: “The provisions set forth in this policy statement apply to all identified classes of information assets.” “This policy applies only to information assets that are classified as ‘Confidential’ or ‘Highly Sensitive’.”

Short, to the Point, Clear Keep It Brief Policy Never Tells Or Suggests How To Achieve The Objective Policy Rarely Changes Because It Does Not Depend On A Person, Process, or Technology

Develop A “Policy On Policy” Clearly Define The Policy Administration Process: For Developing New Policy For Requesting Modification To Existing Policy To Suggest The Elimination Of Outdated Policy – Who Writes The Policy? – Who Reviews The Policy? – Who Approves The Policy? – What Is The Process For Requesting Exceptions?

Policy Priorities The Policies Of The Organization As A Whole Should Take Precedence More Granular Section Policies Can Always Be Added To The Overall Policies For The Organization Specific Enterprise Sections May Require Additional Policies Due To The Nature Of Their Business

Integration of Policy & IT Make Use Of What Is Available Use Of Policy To Develop Standards Use Of Standards To Communicate Policy Make Use Of Platform Specific MVS, AS400, Sun/Solaris, Novell, NT Standards To Develop Policy

The Problem Today

Policy Life-Cycle The greatest challenge of implementing an information security policy is keeping the policy active. The policy life-cycle process is shown below; the last two steps tend to be the most overlooked: – Monitoring, compliance and enforcement; and – Review and Update

Code of Conduct Use Your Corporate “Code of Conduct” To Help Support Your Policy Efforts The “Code of Conduct” Usually Supports Business Directives and Ethical Actions Make Sure Your Policy Efforts Support Your “Code of Conduct”

Consequences There Should Be A Separate Policy That Delineates The Consequences Of Failure To Comply With Policy Appropriate Procedures Must Be Identified, Communicated, and Enforced Need to work with Human Resources / Senior Management

Policy Implementation Develop “Educated” Draft(s) Involve Many Areas / Departments (Form A Policy Committee) Obtain Leadership Approval From The Start Train Staff On Policy / And Security Issues Communicate Content / Milestones Of Process Use A Machine To Sustain The Process

Ideal Times To Develop Policies Your Organization Just Suffered A Loss Competing Organization Just Suffered A Loss Press Discussing A Major Vulnerability Your Organization Just Received Adverse Audit Report Your Organization Just Hit With Lawsuit Your Organization Will Make Major Changes Other InfoSec Initiatives Are Well Underway

Conclusion Developing Policy Is Not An Easy Process Why Do Many Fail? – Complicated Process – Many Twists And Turns – Lack Of Management Support Automated Tools Are Long Overdue

Do you want more??? Jim Stracka