Security Policies and Implementation Issues Lesson 1 Information Systems Security Policy Management
Security Policies and Implementation Issues Lesson 1 Information Systems Security Policy Management
Implementation Issues
Lesson 1
Information Systems Security Policy
Management
ExamplePlan,
Align, would and
be an Example:
Build, System and
Acquire,
IT Contract, what are Controls and
Organize
your getting and Implement
Configuration
What level
•service do you want to do? • Schedules
•agreements
How do you want to get • Deliverables
there? • Builds
• SLAs
Deliver,
Example: Service,
How is and Monitor, Evaluate, and
Example: General
Support
data protected? Assess
Controls Review,
Mulit-factor to add SOX Compliance
Minimize
•layer threats
of protection
• Test and monitor controls
• Analyze data • Analyze effectiveness
• Operational management • Auditing
and support
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Security Policies and Implementation Issues www.jblearning.com Page 5
All rights reserved.
Align, Plan, and Organize: Key
Concepts
Threat
Vulnerability
• A weakness in a system that can be exploited
Risk
Integrity
Authentication
Confidentiality
IA Nonrepudiation
Availability
Integrity
Authentication
Confidentiality
IA Nonrepudiation
Security Policy
Risk Assessment Framework
Information
Security
Governance
Controlling
Defending the
change to IT
business
infrastructure
THREATS COUNTERMEASURES
Appropriate media controls
Theft of Media
Balancing input/output reports, separation of duties, and verification of
Fraud information
Encryption and policy regarding possession of hacking or sniffing tools
Sniffers
Operators
Administrators
Database administrators
Page 461
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Security Policies and Implementation Issues www.jblearning.com Page 20
All rights reserved.
System Administrator Duties and
Responsibilities
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 462-463
Security Policies and Implementation Issues www.jblearning.com Page 21
All rights reserved.
Security Administrator Duties and
Responsibilities
Policy
Vulnerability assessments
Incident response
User-oriented activity management
Information classification implementation
Audit log monitoring and review
Security tool oversight and management
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company Page 463
Security Policies and Implementation Issues www.jblearning.com Page 22
All rights reserved.
Wrap UP