Lab 1 IAP301
Lab 1 IAP301
Upon completing this lab, students will be able to complete the following tasks:
● Define the scope of an acceptable use policy as it relates to the User Domain
● Identify the key elements of acceptable use within an organization as part of an overall
security management framework
● Align an acceptable use policy with the organization’s goals for compliance
● Mitigate the common risks and threats caused by users within the User Domain with the
implementation of an acceptable use policy (AUP)
● Draft an acceptable use policy (AUP) in accordance with the policy framework definition
incorporating a policy statement, standards, procedures, and guidelines
1
e. User destruction or deletion of sensitive files and data
f. Disgruntled employee
g. Office romance “gone bad”
h. Employee blackmail or extortion
4. Open your web browser, and go to the following web sites:
a. https://www.facebook.com/legal/FB_Work_AUP
b. https://www.paypal.com/us/legalhub/acceptableuse-full
5. Review the key elements and scope of these sample acceptable use policies
6. Discuss how a risk can be mitigated within the User Domain with an acceptable use
policy (AUP)
2
Lab #1 – Organization-Wide Security Management AUP
Worksheet
Overview
In this lab, you are to create an organization-wide acceptable use policy (AUP) that follows a
recent compliance law for a mock organization. Here is your scenario:
● Regional ABC Credit union/bank with multiple branches and locations throughout the
region
● Online banking and use of the Internet is a strength of your bank given limited human
resources
● The customer service department is the most critical business function/operation for
the organization
● The organization wants to be in compliance with GLBA and IT security best practices
regarding its employees
● The organization wants to monitor and control use of the Internet by implementing
content filtering
● The organization wants to eliminate personal use of organization owned IT assets and
systems
● The organization wants to monitor and control use of the e-mail system by implementing
e-mail security controls
● The organization wants to implement this policy for all the IT assets it owns and to
incorporate this policy review into an annual security awareness training
Instructions
Using Microsoft Word, create an Acceptable Use Policy for ABC Credit union/bank according to
the following policy template:
3
ABC Credit Union
Policy Name
Policy Statement
Purpose/Objectives
{Insert purpose of the policy as well as the objectives – bulleted list of the policy definition}
Scope
What elements or IT assets or organization-owned assets are within the scope of this policy?}
Standards
{Does this policy point to any hardware, software, or configuration standards? If so, list them
here and explain the relationship of this policy to these standards.}
Procedures
[In this section, explain how you intend to implement this policy throughout this organization.}
Guidelines
[In this section, explain any road blocks or implementation issues that you must overcome and
how you will overcome them per the defined policy guidelines.}
4
Lab Assessment Questions & Answers
1. What are the top risks and threats from the User Domain?
2. Why do organizations have acceptable use policies (AUPs)?
3. Can internet use and e-mail use policies be covered in an Acceptable Use Policy?
4. Do compliance laws such as HIPPA or GLBA play a role in AUP definition?
5. Why is an acceptable use policy not a failsafe means of mitigating risks and threats
within the User Domain?
6. Will the AUP apply to all levels of the organization, why or why not?
7. When should this policy be implemented and how?
8. Why does an organization want to align its policies with the existing compliance
requirements?
9. Why is it important to flag any existing standards (hardware, software, configuration,
etc.) from an AUP?
10. Where in the policy definition do you define how to implement this policy within your
organization?