Lab 1
Lab 1
AUP Worksheet
Overview
In this lab, you are to create an organization-wide acceptable use policy (AUP)
that follows a recent compliance law for mock organization. Here is your
scenario:
• Regional ABC Credit union/bank with multiple branches and locations
throughout the region
• Online banking and use of the Internet is a strength of your bank given
limited human resources
• The customer service department is the moist critical business
function/operation for the organization
• The organization wants to be in compliance with GLBA and IT security best
practices regarding its employees
• The organization wants to monitor and control use of the Internet by
implementing content filtering
• The organization wants to eliminate personal use of organization owned IT
assets and systems
• The organization wants to monitor and control use of the e-mail system by
implementing e-mail security controls
• The organization wants to implement this policy for all the IT assets it owns
and to incorporate this policy review into an annual security awarenes
Instructions
Using Microsoft Word, create an Acceptable Use Policy for ABC Credit union/bank
according to the following policy template:
ABC Credit Union
Merchant Card Processing Policy
Policy Statement
In order to accept credit or debit card payments and compliance with GLBA and IT security
best practice, a ABC Credit union/bank must :
1. Protect consumer and customer records and will therefore help to build and
strengthen consumer reliability and trust
2. Customers gain assurance that their information will be kept secure by the institution
3. Ensure that the payment process and related recordkeeping adhere to organization
accounting guidelines, the Payment Card Industry Data Security Standard (PCI
DSS), and all applicable legislation.
Purpose/Objectives
Scope
All company data stored on electronic devices, hardware or software and other
resources, whether owned or leased by employee or third party is a part of company’s
assets
- The server room must by locked to make sure physical access is restricted.
- All device access to the internal network must be monitored and controlled
- Any account with failed login attempt > 5 must be blocked
- Critical business functions ( the customer service department) must be have
backup, recovery plan,… to make sure its downtime is minimized
- Only allowed people can access the specific resource
- All inbound and outbound traffic must be filtered
Procedures
1. What are the top risks and threats from the User Domain?
- Phishing attacks: These are fraudulent emails or messages that are designed to
trick users into disclosing sensitive information, such as passwords or financial
details.
- Malware: This includes viruses, worms, and other malicious software that can be
used to steal data or disrupt systems.
- Social engineering: This involves using psychological manipulation to trick users
into divulging sensitive information or taking actions that could compromise security.
- Unsecured networks: If users access the internet over an unsecured network, their
data and devices may be vulnerable to attack.
- Lack of awareness: Users who are not aware of security risks and best practices
may be more likely to fall victim to attacks or to accidentally compromise security.
- Weak passwords: Users who use weak passwords or reuse passwords across
multiple accounts are more vulnerable to attack.
- Access controls: If users have access to sensitive systems or data that they do not
need for their job duties, it can increase the risk of unauthorized access or data
breaches
- Physical security: Users who do not secure their devices and workstations properly
may leave them vulnerable to theft or tampering.
- Yes, internet use and e-mail use policies can be covered in an acceptable use
policy (AUP). An AUP is a set of guidelines that outline the acceptable behavior and
use of company resources by employees, contractors, and other users. These
policies can cover a wide range of topics, including internet use and e-mail use.
-An acceptable use policy (AUP) should be implemented as soon as possible after
the decision has been made to create one. This is because an AUP is an important
tool for establishing rules and guidelines for the appropriate use of a network or
service, and it is important for users to be aware of these rules from the outset.
There are several steps that an organization can take to implement an AUP:
-Determine the scope and purpose of the AUP: It is important to define the scope
and purpose of the AUP before drafting it. This will help ensure that the AUP covers
all necessary areas and addresses the specific needs and concerns of the
organization.
-Draft the AUP: Once the scope and purpose of the AUP have been determined, the
AUP can be drafted. This should include a list of specific activities that are allowed
and not allowed, as well as any consequences for violating the AUP.
-Communicate the AUP to users: It is important to make sure that all users are
aware of the AUP and understand their responsibilities under it. This can be done
through a variety of means, such as email, training sessions, or posting the AUP on
the organization's website.
-Obtain user agreement: Users should be required to agree to the terms of the AUP
before they are granted access to the network or service. This can be done through a
user agreement or acceptance process.
-Monitor and enforce compliance: It is important to monitor compliance with the AUP
and take appropriate action when violations occur. This may include revoking access
to the network or service, or taking other disciplinary action as necessary.
An organization may want to align its policies with existing compliance requirements
for several reasons. Some of the most common reasons include:
-To meet legal and regulatory requirements: Many industries are subject to various
laws and regulations that require organizations to follow certain practices and
procedures. Aligning policies with these requirements can help ensure that the
organization is in compliance with these laws and regulations.
-To improve efficiency: Aligning policies with compliance requirements can help
streamline processes and improve efficiency, as it can help ensure that everyone in
the organization is following the same rules and procedures.
There are several security controls that can be deployed to monitor and mitigate
users from accessing external websites that are potentially in violation of an
acceptable use policy (AUP). Some of the most common options include:
-Web filters: Web filters are software tools that can be used to block access to
specific websites or categories of websites. They can be configured to block websites
that are known to violate the AUP, such as sites that contain malicious content or
sites that are not related to work activities.
-URL filtering: URL filtering is a technique that can be used to block access to
specific URLs or groups of URLs. This can be useful for blocking access to specific
websites or pages that are known to violate the AUP.
-Traffic monitoring: Traffic monitoring involves monitoring the network traffic of users
to identify suspicious or inappropriate activity. This can be done through the use of
network monitoring tools that can identify patterns of behavior that may indicate an
attempt to access prohibited websites or engage in activities that violate the AUP.
- There are several security controls that can be deployed to monitor and mitigate
users from accessing external webmail systems and services. Some of the most
common options include:
-Web filters: Web filters are software tools that can be used to block access to
specific websites or categories of websites. They can be configured to block access
to webmail systems and services that are not authorized by the organization
. -URL filtering: URL filtering is a technique that can be used to block access to
specific URLs or groups of URLs. This can be useful for blocking access to webmail
systems and services that are not authorized by the organization.
-Network firewalls: Network firewalls can be configured to block access to specific
websites or categories of websites. They can also be used to block access to certain
types of content, such as webmail systems and services.
-Traffic monitoring: Traffic monitoring involves monitoring the network traffic of users
to identify suspicious or inappropriate activity. This can be done through the use of
network monitoring tools that can identify patterns of behavior that may indicate an
attempt to access prohibited webmail systems and services.
There are several security controls that can be deployed to monitor and mitigate
users from embedding privacy data in email messages and attaching documents that
may contain privacy data. Some of the most common options include:
-Data loss prevention (DLP) software: DLP software is designed to monitor outbound
data and identify sensitive information that may be at risk of being leaked. It can be
configured to flag or block email messages or attachments that contain privacy data,
or to take other actions to prevent the data from being transmitted
-Encryption: Encrypting email messages and attachments can help to protect the
confidentiality of privacy data. By using encryption, organizations can ensure that the
data is only accessible to authorized users.
-Access controls: Access controls can be used to limit access to privacy data to only
those users who need it. This can be done through the use of permissions or other
security measures.
-User training and awareness: Providing users with training and awareness about
the importance of protecting privacy data can help to reduce the risk of data
breaches. This can include educating users about the proper handling of privacy data
and the consequences of mishandling it.
- It depends on the specific circumstances of the situation and the terms of the
organization's acceptable use policy (AUP). Violating an AUP may be grounds for
disciplinary action, including termination of employment, but the appropriate course
of action will depend on the severity of the violation and the specific provisions of the
AUP. It is generally best for organizations to have clear policies in place and to
consistently enforce them in a fair and transparent manner. If an employee violates
an AUP, it may be appropriate for the organization to discuss the situation with the
employee, provide them with an opportunity to explain their actions, and determine
the appropriate course of action based on the circumstances