Chapter 5
Chapter 5
Introduction
Policy
Essential foundation of effective information security
program:
Why Policy?
Properly disseminated
Read
Understood
Agreed-to
EISP Elements
Statement of Purpose:
What the policy is for
Information Technology Security Elements:
Defines information security
Need for Information Technology Security:
justifies importance of information security in the
organization
Information Security Responsibilities and Roles:
Defines organizational structure
References Information Technology standards and guidelines
Example EISP
Protection Of Information:
Use Of Information:
Information is a vital asset and all accesses to, uses of, and processing of
Company X information must be consistent with policies and standards
Example EISP
Legal Conflicts
Exceptions To Policies
Policy Non-Enforcement
Violation Of Law
Revocation Of Access Privileges
Industry-Specific Information Security Standards
Use Of Information Security Policies And Procedures
Security Controls Enforceability
Statement of Purpose
Scope and Applicability
Definition of Technology Addressed
Responsibilities
Systems Management
Management of Stored Materials
Employer Monitoring
Virus Protection
Physical Security
Encryption
Violations of Policy
Procedures for Reporting Violations
Penalties for Violations
Policy Review and Modification
Scheduled Review of Policy and Procedures for Modification
Limitations of Liability
Statements of Liability or Disclaimers
Implementing ISSP
Common approaches:
Number of independent ISSP documents
Single comprehensive ISSP document
Modular ISSP document that unifies policy creation and
administration
Introduction
Created by management
guides the implementation and configuration of technology
Include user access lists, matrices, and capability tables that govern
rights and privileges
Can control access to file storage systems, object brokers or other
network communications devices
ACLs enable administrations to restrict access according to user,
computer, time, duration, etc.
Capability Table: similar method that specifies which subjects and
objects users or groups can access
Specifications are frequently complex matrices, rather than simple
lists or tables
Configuration Rules
Combination SysSPs
Design and develop policy (or redesign and rewrite outdated policy)
Establish management processes to perpetuate policy within
organization
Investigation Phase
Analysis Phase
Design Phase
Implementation Phase
Effective policy
Is written at a reasonable reading level
Readability statistics
Attempts to minimize technical jargon and management
terminology
Maintenance Phase
Introduction
ISPME Checklist
SP 800-18:
Guide for Developing Security Plans