Part 4
Part 4
AND SECURITY
• Responsibilities for security that are shared by all members of the organization
• Responsibilities for security that are unique to each role within the organization
EXAMPLE ENTERPRISE INFORMATION SECURITY
POLICY COMPONENTS
• Statement of purpose
• What the policy is for
• Information technology security elements
• Defines information security
• Need for information technology security
• Justifies importance of information security in the organization
• Information technology security responsibilities and roles
• Defines organizational structures
• Reference to other information technology standards and guidelines
ISSUE-SPECIFIC SECURITY POLICY
• Provides detailed, targeted guidance
• Instructs the organization in secure use of a technology systems
• Begins with introduction to fundamentals technological philosophy of the
organization
• Protects organization from inefficiency and ambiguity
• Documents how the technology-based system is controlled
• Identifies the process and authorities that provide this control
• Indemnifies that organization against liability for an employee’s
inappropriate or illegal system use
ISSUE-SPECIFIC SECURITY POLICY
• Every organization’s ISSP should:
• Address specific technology-based systems
• Require frequent updates
• Contain an issue statement on the organization’s position on an issue
• ISSP topics
• Email and internet use
• Minimum system configurations
• Prohibitions against hacking
• Home use of company-owned computer equipment
• Use of personal equipment on company networks
• Use of telecommunication technologies
• Use of photocopy equipment
COMPONENTS OF THE ISSP
• Statement of purpose
• Scope and applicability
• Definition of technology addressed
• Responsibilities
• Authorized access and usage of equipment
• User access
• Fair and responsible use
• Protection of privacy
COMPONENTS OF THE ISSP
• Prohibited usage of equipment
• Disruptive use or misuse
• Criminal use
• Offensive or harassing materials
• Copyrighted, licensed or other intellectual property
• Other restrictions
• System management
• Management of stored materials
• Employer monitoring
• Virus protection
• Physical security
• encryption
COMPONENTS OF THE ISSP
• Violations of policy
• Procedures for reporting violation
• Penalties for violations
• Policy review and modification
• Scheduled review of policy and procedures for modification
• Limitations of liability
• Statements of liability or disclaimers
SYSTEM-SPECIFIC SECURITY POLICY
• System-specific security policies frequently do not look like other
types of policy
• They may function as standards or procedures to be used when configuring
or maintaining systems
• System-specific security policies can be separated into
• Management guidance
• Technical specifications
• Or combined in a single policy document
MANAGERIAL GUIDANCE SYSTEM-SPECIFIC SECURITY
POLICIES
• Created by management to guide the implementation and
configuration of technology
• Applies to any technology that affects the confidentiality, integrity
or availability of information
• Informs technologists of management intent
TECHNICAL SPECIFICATIONS SYSTEM-SPECIFIC
SECURITY POLICIES
• System administrators’ directions on implementing managerial
policy
• Each type of equipment has its own of policies
• General methods of implementing technical controls
• Access control lists
• Configuration rules
TECHNICAL SPECIFICATIONS SYSTEM-SPECIFIC
SECURITY POLICIES
• Access control lists
• Include the user access list, matrices and capability tables that govern the
rights and privileges
• A similar method that specifies which subjects and objects users or group
can access is called a capability table
• These specifications are frequently complex matrices, rather than simple list
or tables
• Enable administrations to restrict access according to user, computer, time
duration or even a particular file
TECHNICAL SPECIFICATIONS SYSTEM-SPECIFIC
SECURITY POLICIES
• Access control lists regulate
• Who can use the system
• What authorized users can access
• When and where authorized users can access the system
• How authorized users can access the system
• Restricting what users can access, e.g. printers, files, communications, and
application
• Administrators set user privileges
• Read, write, create, modify, delete, compare, copy
TECHNICAL SPECIFICATIONS SYSTEM-SPECIFIC
SECURITY POLICIES
• Configuration rules
• Specific configuration codes entered into security systems
Guide the execution of the system when information is passing through it