Security Policies

Security policy is a broad statement produced by the senior management that dictates the role of security within the organization.

Characteristics of Security Policy

  • It must be generic, non technical, and easily understood
  • It must integrate security into all business processes and functions
  • It must be reviewed and modified periodically or as the company environment changes
  • It must support the vision and mission of the organization

Types of security policies:

  • Organizational security policy: It focuses on issues relevant to every aspect of the organization
  • Issue specific policy : It focuses on a specific service, department, or function that is distinct from the organization as a whole
  • System specific policy : It focuses on individual systems

Different security policies work together to meet the objectives of a comprehensive security program.

  • Regulatory Policy: Regulatory policy ensures that the organization is following industry specific regulations or standards. Example: HIPPA, PCI DSS, etc.
  • Advisory Policy: Advisory policy strongly advises the employees or users on the type of behaviors and activities to be followed within the organization. Example: Policy for handling medical or personal information
  • Informative Policy: Informative policy informs the employees of certain key topics. Example: Policy explaining the goals and mission of an organization

Security Policy Implementation

Policy documents often come with the endorsement or signature of the executive powers within an organization.

  • Standard policy components : Purpose statement, policy objectives, resources provision, staff allocation, and guidelines and standards
  • Policy elements : Purpose, scope, responsibilities, and compliance
  • Policy creation guidelines: Assigning a principal function to be responsible for control, compliance with policy as a condition of employment, and avoiding exceeding two pages and use generic terms
  • Management responsibilities for policy: Protecting resource assets within the company’s control, implementing security in accordance with the company policy, and initiating corrective actions for security violations
  • Policy enforcement: Avoiding errors that can lead to legal challenges and ensuring compliance with policy

Policy Chart

A strategic goal can be viewed as the ultimate endpoint, while tactical goals are the steps necessary to achieve it.

Standards

  • Refer to the mandatory activities, rules, actions, or regulations
  • Example: ISO 27001

Guidelines

  • Refer to the recommended operational guides or actions provided to the users operations staff, IT staff, and others
  • Example: Security Password Guideline

Procedures:

  • Refer to the step by step tasks to be performed to achieve a certain objective
  • Example: Incident response procedure

Baselines:

  • Define minimum level of security that every system must meet
  • Example: All Windows 7 systems must have SP1 installed

Discover more from Information Security Blogs

Subscribe to get the latest posts sent to your email.

Leave a Reply

Discover more from Information Security Blogs

Subscribe now to keep reading and get access to the full archive.

Continue reading

Discover more from Information Security Blogs

Subscribe now to keep reading and get access to the full archive.

Continue reading