Security Policy Cheat Sheet What is a Security Policy? Security policies are documents that set out executive instructions, business procedures, and processes related to security controls, introduced to reduce the security risk to the organisation. When personnel are aware of and follow good company security policies, the likelihood of a security breach is greatly reduced. This, in turn, lowers the overall risk level of the Information Security Management System (ISMS) to the business. Security controls are a requirement for businesses aiming to comply with data privacy laws such as GDPR, and for those aiming to become certified in a security framework. What is a Security Framework? A security framework is a set of recommended security controls, guidelines or best practices that are often Industry Standard. Sometimes security frameworks are set by government bodies such as those from NIST, in the USA. They can be set by organizations such as the International Organization of Standards (ISO). A framework will set out controls that are required to be implemented by an organization aiming for certification. Once the organization complies with the applicable controls, it must undergo an audit to confirm the controls are in place. After a successful audit, the organization may achieve certification for a period (normally 1 or 3 years). Certification under ISO 27001 may be a requirement under a contract with a customer or used to attract customers who require their suppliers to achieve certification before entering business with them. Ultimately, it revolves around money but has the added benefit of making organizations think about the security of data. Writing Policies To make policies effective, there are several things to consider: Layout The document must flow well. It should follow a logical order that makes sense to the reader. When you read a book, you don’t start at chapter 3, move on to chapter 7 and then back to 1. If you read like that, the story becomes jumbled and hard to follow. Start at the beginning of the procedure and make logical steps throughout. A suggested format: • • • • • • • • • • • • Title and reference number Owner – Is the person with overall responsibility for the document Record of Approval/Executive Sign off Version control – A table showing previous versions and changes Control matrix – A table with references to the required controls Purpose – The reason why the policy exists Scope – The areas of the business the policy covers Responsibilities – The people required to act within the policy Definitions – Information about the acronyms used Procedure – Detailed instructions on the steps required Additional sections and subsections References – to other documents Readership When writing policies, you need to think about the people who are reading the documents. Are you the CEO of a small tech start-up of fewer than 10 employees, where everyone lives within 15 miles of the office? Are you the IT engineer for a nonprofit with 100 employees based all around the country? Are you the Governance, Risk and Compliance Analyst for a global enterprise? The number of people reading your policies matters, but not as much as the actual people reading them. Who are the readers? Will they understand the information? • • • Professionals Manual labour Technical specialists Is English their native language? • • Aim the writing style and reading age towards a young teenager Do you need to get the policy translated? Is the policy to be read by all employees or a select few? • Do you need to have the janitor read the Data Backup policy when they only ever sign in to read their payslip or request cleaning materials? Accountability of Readers To comply with different security frameworks, your employees may be required to sign to confirm they have read and understood the policies required to complete their duties. You must implement a way for this to happen that cannot be misrepresented and is auditable. Some companies provide this through the internal Learning Management System (LMS) or host the policies on an external platform. Users sign in using single-sign-on, read, and sign to confirm they understand. You can set the readership of the policy (Entire company, selected departments, or people). Doing it in this way ensures you meet the requirements of the controls. Length of a Policy Is it a Technical Policy or Procedure? • • • • • If the document is not technical in nature or purpose, then keep it simple Don’t fill it will fluff that doesn’t need to be there Don’t expect employees to read a 45-page policy and understand anything at the end of it It is better to have 2x 15-page policies, than 1x 30-page policy Stay direct, clear, and concise Legal Terms and Language 99.999% of your employees do not understand Legalese or the legal language written in English. If your policies contain this, remove it, or convert it into understandable, direct, clear, and concise terms. Title and Reference Number When you are naming policies, try and use names that fit with the content and if you are applying for certification under a standard like ISO 27001, use names that correspond to the controls or areas that are required. Set up a standard naming convention that can also be used to reference the document within a master document control method. Examples could be: • • • DEV-SDLC-POLICY Software Development Lifecycle Policy SEC-MDM-POLICY Security & Mobile Device Management IT-SAFE-USE-POLICY Safe & Acceptable Use Policy Templates Templates, when used the correct way may help you. However, if you use a template that has been written for a different company, you may find that it is not suitable for the requirements of your business, and it could cost you repeat audit costs and consultant fees. Purchased templates that have been designed for the industry, specific to certifications such as ISO 27001 or SOC 2 may be just the thing to help you implement the required documentation. You may even wish to create your own. Once you have an acceptable template, you should use the same template for every policy. Introduce your company branding, font selection and colour schemes. Trust me, your policies will look great, and the consistent approach will provide a familiar feel to company documentation among employees. Every policy must be written specifically for the organization implementing it. Re-using content from policies published online by other companies will lead to problems and should be avoided at all costs. Spend the time to customise! Stuart’s TOP TIP – Tell them why! Security is often seen as the department of NO! This can bring in some negative reactions or feelings from people who have been doing their job the same way for 15 years. Now you are asking them to do something differently. It takes them more time and they may find that frustrating. Tell them why the controls have been introduced or the procedure changed. When employees understand the reasoning behind the controls, they are much more receptive to their introduction. Security Policy Training The author, Stuart W is in the process of writing a course to help delegates to understand the intricacies of Security Policies. The information above is a snippet of the course content and can be used to help when writing policies within educational courses such as university degrees or indeed when producing policies for business. The course will be available in the latter half of 2022. To be the first to know about the course launch date and maybe a cheeky little discount, please ensure that you have signed up with the mailing list on the website. www.techsecscot.com © Copyright owned by TechSecScot.com 2022 This document is not to be amended, used within course material, or published on any websites without the prior authorization of the author. By using this information, you do so at your own risk and any financial losses are the responsibility of you and you alone. For information purposes only. This is not legal or consultation advice.