Lecture 35
Lecture 35
Lecture # 35
1
Objectives
• Introduction to Security Policy.
2
Security Policy
• A security policy is a document that spells out
principles and strategies for an organization to
maintain the security of its information assets.
3
Security Policy (Cont..)
• A security policy (also called an information security
policy or IT security policy) is a document that spells
out the rules, expectations, and overall approach that
an organization uses to maintain the confidentiality,
integrity, and availability of its data.
4
Security Policy (Cont..)
• Security policies exist at many different levels, from
high-level constructs that describe an enterprise’s
general security goals and principles to documents
addressing specific issues, such as remote access or
Wi-Fi use.
5
Security Policy (Cont..)
• A security policy is frequently used in conjunction
with other types of documentation such as standard
operating procedures.
6
Security Policy (Cont..)
• These documents work together to help the company
achieve its security goals.
7
Security Policy (Cont..)
Some of the benefits of a well-designed and
implemented security policy include:
8
Security Policy (Cont..)
Guides the implementation of technical controls
• It’s then up to the security or IT teams to translate
these intentions into specific technical actions.
9
Security Policy (Cont..)
Guides the implementation of technical controls
• The specific authentication systems and access
control rules used to implement this policy can
change over time, but the general intent remains the
same.
10
Security Policy (Cont..)
Guides the implementation of technical controls
• Without a place to start from, the security or IT teams
can only guess senior management’s desires.
11
Security Policy (Cont..)
Sets clear expectations
• Without a security policy, each employee or user will
be left to his or her own judgment in deciding what’s
appropriate and what’s not.
12
Security Policy (Cont..)
Sets clear expectations
• A security policy should also clearly spell out how
compliance is monitored and enforced.
13
Security Policy (Cont..)
Helps meet regulatory and compliance requirements
• Documented security policies are a requirement of
legislation like HIPAA and Sarbanes-Oxley, as well
as regulations and standards like PCI-DSS, ISO
27001, and SOC2.
14
Security Policy (Cont..)
Helps meet regulatory and compliance requirements
• Even when not explicitly required, a security policy is
often a practical necessity in crafting a strategy to
meet increasingly stringent security and data privacy
requirements.
15
Security Policy (Cont..)
Improves organizational efficiency and helps meet
business objectives
• A good security policy can enhance an organization’s
efficiency.
16
Security Policy (Cont..)
Improves organizational efficiency and helps meet
business objectives
• Security policies should also provide clear guidance
for when policy exceptions are granted, and by
whom.
17
Security Policy (Cont..)
Three types of security policies
• Security policies can vary in scope, applicability, and
complexity, according to the needs of different
organizations.
18
Security Policy (Cont..)
Three types of security policies
• While there’s no universal model for security
policies, the National Institutes of Standards and
Technology (NIST) spells out three distinct types in
Special Publication (SP) 800-12:
19
Security Policy (Cont..)
Three types of security policies
Program policy
• Program policies are strategic, high-level blueprints
that guide an organization’s information security
program.
20
Security Policy (Cont..)
Three types of security policies
Program policy
• They spell out the purpose and scope of the program,
as well as define roles and responsibilities and
compliance mechanisms.
21
Security Policy (Cont..)
Three types of security policies
Program policy
• Also known as master or organizational policies,
these documents are crafted with high levels of input
from senior management and are typically technology
agnostic.
22
Security Policy (Cont..)
Three types of security policies
Program policy
• They are the least frequently updated type of policy,
as they should be written at a high enough level to
remain relevant even through technical and
organizational changes.
23
Security Policy (Cont..)
Three types of security policies
Issue-specific policy
• Issue-specific policies build upon the generic security
policy and provide more concrete guidance on certain
issues relevant to an organization’s workforce.
24
Security Policy (Cont..)
Three types of security policies
Issue-specific policy
• Common examples could include a network security
policy, bring-your-own-device (BYOD) policy, social
media policy, or remote work policy.
25
Security Policy (Cont..)
Three types of security policies
Issue-specific policy
• These may address specific technology areas but are
usually more generic.
26
Security Policy (Cont..)
Three types of security policies
Issue-specific policy
• A remote access policy might state that offsite access
is only possible through a company-approved and
supported VPN, but that policy probably won’t name
a specific VPN client.
27
Security Policy (Cont..)
Three types of security policies
System-specific policy
• A system-specific policy is the most granular type of
IT security policy, focusing on a particular type of
system, such as a firewall or web server, or even an
individual computer.
28
Security Policy (Cont..)
Three types of security policies
System-specific policy
• NIST states that system-specific policies should
consist of both a security objective and operational
rules.
29
Security Policy (Cont..)
Three types of security policies
System-specific policy
• IT and security teams are heavily involved in the
creation, implementation, and enforcement of system-
specific policies but the key decisions and rules are
still made by senior management.
30
Questions
Any Question Please?
31
Further Readings
• Chapter No. 1
Computer_Security_Principles_and_Practice_(3rd_E
dition)
By William Stallings and Lawrie Brown
32
Thanks
33