Information Security Policy

Slides:



Advertisements
Similar presentations
Configuration Management
Advertisements

Information Security Policy
information Security Blueprint
Information Security Policy
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Security Controls – What Works
Information Security Policies and Standards
Each problem that I solved became a rule which
Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Chapter 3: The Project Management Process Groups
Computer Security: Principles and Practice
Purpose of the Standards
Supplier Ethics: Program Checklist
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Network security policy: best practices
Guidelines for constructing a Compliance Program for Medicaid Managed Care Organizations and PrePaid Health Plans As provided by the Medicaid Alliance.
Information Security Policy
Control environment and control activities. Day II Session III and IV.
CSE 4482: Computer Security Management: Assessment and Forensics
Internal Auditing and Outsourcing
A SOUND INVESTMENT IN SUCCESSFUL VR OUTCOMES FINANCIAL MANAGEMENT FINANCIAL MANAGEMENT.
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
SEC835 Database and Web application security Information Security Architecture.
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Copyright Course Technology 1999
1 Building and Maintaining Information Systems. 2 Opening Case: Yahoo! Store Allows small businesses to create their own online store – No programming.
ITC358 ICT Management and Information Security
Basics of OHSAS Occupational Health & Safety Management System
TEL2813/IS2820 Security Management
Developing an Effective Ethics Program
Chapter 5 Internal Control over Financial Reporting
Responsible Data Use: Data restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
MANAGEMENT of INFORMATION SECURITY Second Edition.
What is a Business Analyst? A Business Analyst is someone who works as a liaison among stakeholders in order to elicit, analyze, communicate and validate.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 4 I NFORMATION S ECURITY P OLICY Each problem that I solved became a rule which served afterwards.
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Module 2: Creating a Plan for Network Security. Overview Introduction to Security Policies Designing Security by Using a Framework Creating a Security.
Environmental Management System Definitions
IT Incident Response The goals How to achieve this Policies Standards Architecture People Process & Technology What can we really.
Responsible Data Use: Data Restrictions Robert R. Downs, PhD NASA Socioeconomic Data and Applications Center (SEDAC) Center for International Earth Science.
McGraw-Hill/Irwin © 2003 The McGraw-Hill Companies, Inc., All Rights Reserved. 6-1 Chapter 6 CHAPTER 6 INTERNAL CONTROL IN A FINANCIAL STATEMENT AUDIT.
Data Governance 101. Agenda  Purpose  Presentation (Elijah J. Bell) Data Governance Data Policy Security Privacy Contracts  FERPA—The Law  Q & A.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 4 I NFORMATION S ECURITY P OLICY Each problem that I solved became a rule which served afterwards.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
CC3020N Fundamentals of Security Management CC3020N Fundamentals of Security Management Lecture 4 Security Policy, Standard, and Practices.
~ pertemuan 4 ~ Oleh: Ir. Abdul Hayat, MTI 20-Mar-2009 [Abdul Hayat, [4]Project Integration Management, Semester Genap 2008/2009] 1 PROJECT INTEGRATION.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Session 6: Data Flow, Data Management, and Data Quality.
Slide 1 INFORMATION SECURITY POLICY  ” Avoiding danger is no safer in the long run than exposure”. Helen Keller  “Anyone who has never made a mistake,
Information Security Policy Development for Management By Peter McCarthy.
1.  1. Introduction  2. Policy  3. Why Policy should be developed.  4. www policies 2.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Governance, risk and ethics. 2 Section A: Governance and responsibility Section B: Internal control and review Section C: Identifying and assessing risk.
Responsible Data Use: Data restrictions Robert R. Downs, PhD Center for International Earth Science Information Network (CIESIN), Columbia University Version.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
MANAGEMENT of INFORMATION SECURITY, Fifth Edition.
 P lanning is an intellectual process, consicous determination of courses of action, the basing of decisions on purpose, facts and considered estimates.
Information Security Policy
MANAGEMENT of INFORMATION SECURITY Second Edition.
Providing Access to Your Data: Handling sensitive data
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Project Management Process Groups
Chapter 8 Developing an Effective Ethics Program
Cyber security Policy development and implementation
Security Policy and Standards
Presentation transcript:

Information Security Policy

Objectives Upon completion of this material you should be able to: –Define information security policy and understand its central role in a successful information security program –Describe the three major types of information security policy and explain what goes into each type –Develop, implement, and maintain various types of information security policies

Introduction Policy is the essential foundation of an effective information security program –“The success of an information resources protection program depends on the policy generated, and on the attitude of management toward securing information on automated systems” Policy maker sets the tone and emphasis on the importance of information security

Introduction (cont’d.) Policy objectives –Reduced risk –Compliance with laws and regulations –Assurance of operational continuity, information integrity, and confidentiality

Why Policy? A quality information security program begins and ends with policy Policies are the least expensive means of control and often the most difficult to implement Basic rules for shaping a policy –Policy should never conflict with law –Policy must be able to stand up in court if challenged –Policy must be properly supported and administered

Why Policy? (cont’d.) Figure 4-1 The bull’s eye model Source: Course Technology/Cengage Learning

Why Policy? (cont’d.) Policies are important reference documents –For internal audits –For the resolution of legal disputes about management's due diligence –Policy documents can act as a clear statement of management's intent

Policy, Standards, and Practices Policy –A plan or course of action that influences decisions –For policies to be effective they must be properly disseminated, read, understood, agreed-to, and uniformly enforced –Policies require constant modification and maintenance

Policy, Standards, and Practices (cont’d.) Types of information security policy –Enterprise information security program policy –Issue-specific information security policies –Systems-specific policies

Policies, Standards, & Practices Figure 4-2 Policies, standards and practices Source: Course Technology/Cengage Learning

EISP Elements EISP documents should provide: –An overview of the corporate philosophy on security –Information about information security organization and information security roles Responsibilities for security that are shared by all members of the organization Responsibilities for security that are unique to each role within the organization

Example ESIP Components Statement of purpose –What the policy is for Information technology security elements –Defines information security Need for information technology security – Justifies importance of information security in the organization

Example ESIP Components (cont’d.) Information technology security responsibilities and roles –Defines organizational structure Reference to other information technology standards and guidelines

Issue-Specific Security Policy (ISSP) Provides detailed, targeted guidance –Instructs the organization in secure use of a technology systems –Begins with introduction to fundamental technological philosophy of the organization Protects organization from inefficiency and ambiguity –Documents how the technology-based system is controlled

Issue-Specific Security Policy (cont’d.) Protects organization from inefficiency and ambiguity (cont’d.) –Identifies the processes and authorities that provide this control Indemnifies the organization against liability for an employee’s inappropriate or illegal system use

Issue-Specific Security Policy (cont’d.) Every organization’s ISSP should: –Address specific technology- based systems –Require frequent updates –Contain an issue statement on the organization’s position on an issue

Issue-Specific Security Policy (cont’d.) ISSP topics – and internet use –Minimum system configurations –Prohibitions against hacking –Home use of company-owned computer equipment –Use of personal equipment on company networks –Use of telecommunications technologies –Use of photocopy equipment

Components of the ISSP Statement of Purpose –Scope and applicability –Definition of technology addressed –Responsibilities Authorized Access and Usage of Equipment –User access –Fair and responsible use –Protection of privacy

Components of the ISSP (cont’d.) Prohibited Usage of Equipment –Disruptive use or misuse –Criminal use –Offensive or harassing materials –Copyrighted, licensed or other intellectual property –Other restrictions

Components of the ISSP (cont’d.) Systems management –Management of stored materials –Employer monitoring –Virus protection –Physical security –Encryption Violations of policy –Procedures for reporting violations –Penalties for violations

Components of the ISSP (cont’d.) Policy review and modification –Scheduled review of policy and procedures for modification Limitations of liability –Statements of liability or disclaimers

System-Specific Security Policy System-specific security policies (SysSPs) frequently do not look like other types of policy –They may function as standards or procedures to be used when configuring or maintaining systems SysSPs can be separated into –Management guidance –Technical specifications –Or combined in a single policy document

Managerial Guidance SysSPs Created by management to guide the implementation and configuration of technology Applies to any technology that affects the confidentiality, integrity or availability of information Informs technologists of management intent

Technical Specifications SysSPs System administrators’ directions on implementing managerial policy Each type of equipment has its own type of policies General methods of implementing technical controls –Access control lists –Configuration rules

Access control lists –Include the user access lists, matrices, and capability tables that govern the rights and privileges –A similar method that specifies which subjects and objects users or groups can access is called a capability table –These specifications are frequently complex matrices, rather than simple lists or tables Technical Specifications SysSPs (cont’d.)

Access control lists (cont’d.) –Enable administrations to restrict access according to user, computer, time, duration, or even a particular file Access control lists regulate –Who can use the system –What authorized users can access –When authorized users can access the system Technical Specifications SysSPs (cont’d.)

Access control lists regulate (cont’d.) –Where authorized users can access the system from –How authorized users can access the system –Restricting what users can access, e.g. printers, files, communications, and applications Administrators set user privileges –Read, write, create, modify, delete, compare, copy Technical Specifications SysSPs (cont’d.)

Figure 4-5 Windows XP ACL Source: Course Technology/Cengage Learning

Technical Specifications SysSPs (cont’d.) Configuration rules –Specific configuration codes entered into security systems Guide the execution of the system when information is passing through it Rule policies are more specific to system operation than ACLs –May or may not deal with users directly

Technical Specifications SysSPs (cont’d.) Many security systems require specific configuration scripts telling the systems what actions to perform on each set of information they process

Technical Specifications SysSPs (cont’d.) Figure 4-6 Firewall configuration rules Source: Course Technology/Cengage Learning

Often organizations create a single document combining elements of both management guidance and technical specifications SysSPs This can be confusing, but practical Care should be taken to articulate the required actions carefully as the procedures are presented Technical Specifications SysSPs (cont’d.)

Guidelines for Effective Policy For policies to be effective, they must be properly: –Developed using industry- accepted practices –Distributed or disseminated using all appropriate methods –Reviewed or read by all employees –Understood by all employees –Formally agreed to by act or assertion –Uniformly applied and enforced

Developing Information Security Policy It is often useful to view policy development as a two-part project –First, design and develop the policy (or redesign and rewrite an outdated policy) –Second, establish management processes to perpetuate the policy within the organization The former is an exercise in project management, while the latter requires adherence to good business practices

Developing Information Security Policy (cont’d.) Policy development projects should be –Well planned –Properly funded –Aggressively managed to ensure that it is completed on time and within budget The policy development project can be guided by the SecSDLC process

Developing Information Security Policy (cont’d.) Investigation phase –Obtain support from senior management, and active involvement of IT management, specifically the CIO –Clearly articulate the goals of the policy project –Gain participation of correct individuals affected by the recommended policies

Developing Information Security Policy (cont’d.) Investigation phase (cont’d.) –Involve legal, human resources and end-users –Assign a project champion with sufficient stature and prestige –Acquire a capable project manager –Develop a detailed outline of and sound estimates for project cost and scheduling

Developing Information Security Policy (cont’d.) Analysis phase should produce –New or recent risk assessment or IT audit documenting the current information security needs of the organization –Key reference materials Including any existing policies

Figure 4-8 End user license agreement for Microsoft Windows XP Source: Course Technology/Cengage Learning Developing Information Security Policy (cont’d.)

Design phase includes –How the policies will be distributed –How verification of the distribution will be accomplished –Specifications for any automated tools –Revisions to feasibility analysis reports based on improved costs and benefits as the design is clarified

Developing Information Security Policy (cont’d.) Implementation phase includes –Writing the policies Making certain the policies are enforceable as written Policy distribution is not always straightforward Effective policy is written at a reasonable reading level, and attempts to minimize technical jargon and management terminology

Developing Information Security Policy (cont’d.) Maintenance Phase –Maintain and modify the policy as needed to ensure that it remains effective as a tool to meet changing threats –The policy should have a built- in mechanism via which users can report problems with the policy, preferably anonymously –Periodic review should be built in to the process

Policy Comprehension Figure 4-9 Readability statistics Source: Course Technology/Cengage Learning

Automated Tools Figure 4-10 The VigilEnt policy center Source: Course Technology/Cengage Learning

The Information Securities Policy Made Easy Approach Gathering key reference materials Defining a framework for policies Preparing a coverage matrix Making critical systems design decisions Structuring review, approval, and enforcement processes

The Information Securities Policy Made Easy Approach (cont’d.) Figure 4-11 A sample coverage matrix Source: Course Technology/Cengage Learning

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist –Perform a risk assessment or information technology audit To determine your organization's unique information security needs –Clarify the meaning of “policy” within your organization –Ensure clear roles and responsibilities related to information security Including responsibility for issuing and maintaining policies

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist (cont’d.) –Convince management that it is advisable to have documented information security policies –Identify the top management staff who will be approving the final information security document and all influential reviewers –Collect, read and summarize all existing internal information security awareness material

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist (cont’d.) –Gather ideas that stakeholders believe should be included in a new or updated information security policy –Examine other policies issued by your organization to identify prevailing format, style, tone, length, and cross-references –Identify the audience and distribution method of information security policy materials

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist (cont’d.) –Determine the extent to which the audience is literate, computer knowledgeable, and receptive to security messages –Decide whether some other awareness efforts must take place before information security policies are issued –Using ideas from the risk assessment, prepare a list of absolutely essential policy messages that must be communicated

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist (cont’d.) –If there is more than one audience, match the audiences with the bottom-line messages to be communicated through a coverage matrix –Determine how the policy material will be disseminated, noting the constraints and implications of each medium of communication

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist (cont’d.) –Review the compliance checking process, disciplinary process, and enforcement process to ensure that they all can work smoothly with the new policy document –Determine whether the number of messages is too large to be handled all at one time If so, identify different categories of material to be issued at different times

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist (cont’d.) –Outline the topics to be included in the first document reviewed by several stakeholders –Based on comments from the stakeholders, revise the initial outline and prepare a first draft –Have the first draft reviewed by stakeholders for initial reactions, suggestions, and implementation ideas –Revise the draft in response to comments from stakeholders

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist (cont’d.) –Request top management approval on the policy –Prepare extracts of the policy document for selected purposes –Develop an awareness plan that uses the policy document as a source of ideas and requirements

The Information Securities Policy Made Easy Approach (cont’d.) ISPME checklist (cont’d.) –Create a working papers memo indicating the disposition of all comments received from reviewers, even if no changes were made –Write a lessons-learned memo about the project so that the next version can be prepared more efficiently, better received, and more responsive –Prepare a list of next steps to implement the requirements specified in the policy document

The Information Securities Policy Made Easy Approach (cont’d.) ISPME next steps –Post polices to intranet or equivalent –Develop a self-assessment questionnaire –Develop revised user ID issuance form –Develop agreement to comply with information security policies form –Develop tests to determine if workers understand policies –Assign information security coordinators –Train information security coordinators

The Information Securities Policy Made Easy Approach (cont’d.) ISPME next steps (cont’d.) –Prepare and deliver a basic information security training course –Develop application specific information security policies –Develop a conceptual hierarchy of information security requirements –Assign information ownership and custodianship

The Information Securities Policy Made Easy Approach (cont’d.) ISPME next steps (cont’d.) –Establish an information security management committee –Develop an information security architecture document

SP Rev.1: Guide for Developing Security Plans for Federal Information Systems NIST Special Publication , Rev. 1 reinforces a business process-centered approach to policy management Policies are living documents –These documents must be properly disseminated (distributed, read, understood and agreed to), and managed

SP Rev.1: Guide for Developing Security Plans for Federal Information Systems (cont’d.) Good management practices for policy development and maintenance make for a more resilient organization Policy requirements –An individual responsible for reviews –A schedule of reviews

SP Rev.1: Guide for Developing Security Plans for Federal Information Systems (cont’d.) Policy requirements (cont’d.) –A method for making recommendations for reviews –An indication of policy and revision date

A Final Note on Policy Lest you believe that the only reason to have policies is to avoid litigation, it is important to emphasize the preventative nature of policy –Policies exist, first and foremost, to inform employees of what is and is not acceptable behavior in the organization –Policy seeks to improve employee productivity, and prevent potentially embarrassing situations