Download presentation
Presentation is loading. Please wait.
Published byHoratio Webb Modified over 9 years ago
1
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines
2
Policy ● A written statement from an authority declaring a course of action for the sake of expediency. – Example: Policy dictates that all employees will read and sign the AUP before receiving access to the computing system.
3
Standard ● A detailed level of attainment. – IT standards ensure that consistent security controls are adopted. – Example: The Common Criteria have established standards for hardware and software security.
4
Procedures ● A description of the process used to accomplish a task. – Example: A procedure checklist is used to perform and verify backups.
5
Guidelines ● A suggested course of action which can be specific or general. – Example: The guidelines for a secure password include but are not limited to...
6
IT Policy Framework Purpose ● The purpose is to achieve an acceptable level of risk.
7
Data Classification Standards ● US Government ● Private enterprise
8
US Government ● Executive order 13526 (2009) – Top secret – Secret – Confidential – Public domain information is considered unclassified and is not part of the classification standard.
9
Top Secret ● Would cause grave damage to national security if it were disclosed.
10
Secret ● Would cause serious damage to national security if it were disclosed.
11
Confidential ● Would cause damage to national security if it were disclosed.
12
Guidelines ● Yes there are guidelines for separating information into the appropriate categories.
13
Unclassified ● Would you believe there are classifications for unclassified information?
14
Unclassified ● Poses no threat to national security if exposed.
15
Controlled Unclassified ● For official use only. – Example: law enforcement classified
16
Alternative classifications ● Top Secret ● Secret ● Confidential ● Restricted ● Protect ● Unclassified
17
Private Enterprise Data Classification* *(Kim, Solomon) ● Private ● Confidential ● Internal use only ● Public domain data
18
*Private ● Data about people, – Example: compliance laws like HIPAA
19
Confidential ● Information owned by the enterprise – Customer lists – Pricing information – Intellectual property – Internal use only information
20
Internal Use Only ● Information shared internally by an organization. – Most communications are not intended to be shared.
21
Public Domain Data ● Shared with the public – Web site content – White papers
22
Alternative Confidential Restricted Protected Unclassified (public)
23
Alternative ● Confidential – Substantially would undermine the financial viability of the organization.
24
Alternative ● Restricted – Cause a substantial loss of earning potential. Advantage to competitors
25
Alternative ● Protected – Cause financial loss
26
Data Classification Challanges ● Perfection is the enemy of the good! – If you insist on perfection, your system will be difficult to implement. – Employees must be properly educated in order to classify data effectively.
27
Data Classification Challenges ● Perfection is the enemy of the good! – If too complex it will fail due to lack of use – You are better served by keeping your classification scheme simple (no more complex than is necessary)
28
Data Classification Challenges ● Perfection is the enemy of the good! – Development and implementation of a data classification scheme will require resources. – If its complex, it will likely be expensive to implement
29
Implementation Tips ● Understand what is achievable – any data classification policy must become less complex as more individuals become involved in implementing the policy.
30
Implementation Tips ● Those who have something at stake should be involved in the data classification policy development.
31
Implementation Tips ● Provide appropriate education and visibility. – Any data classification scheme should be posted on the company/agency internal web- page.
32
Implementation Tips ● Align your data classification scheme with regulatory (compliance) requirements.
33
Compliance Laws ● Legislation exists mandating security controls to protect private and confidential data.
34
Example Compliance Legislation ● SOX (Sarbanes-Oxley, 2002) – Requires security controls to protect the confidentiality and integrity of financial reporting.
35
Example Compliance Legislation ● GLBA (Gramm-Leach-Bliley, 1999) – Financial institutions must protect client's private financial information.
36
Example Compliance Legislation ● HIPAA (Health Insurance Portability and Accountability, 1996) – Health care organizations must secure patient information.
37
Example Compliance Legislation ● CIPA (Children's Internet Protection Act, 2000) – Requires public schools and public libraries to implement an Internet safety policy.
38
Example Compliance Legislation ● FERPA (Family Educational Rights and Privacy Act, 1974) – Protects the school records and other private data of students.
39
Example Compliance Standard ● PCI-DSS (Payment Card Industry Data Security Standard) – An information security standard for organizations that handle payment card information. ● Debit ● Credit ● Prepaid ● ATM ● etc
40
Professionalization of the SA Discipline ● Establishment of professional societies/organizations ● Credentials – By study and examination – University degrees
41
Example Professional Organizations ● LISA (SAGE), Large Installation System Administration ● (ISC)2 – International Information Systems Security Certification Consortium.
42
Professional Organizations ● Offer credentials through study and examination ● Code of ethics ● Professional networking ● A forum for sharing new technology, ideas, etc.
43
Recommended Areas of Knowledge ● Access controls ● Cryptography ● Network security ● Risk management ● Application development security ● Legal regulations and compliance ● Operations security
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.