Uploaded by Jaycee Clavel

Lecture-5

advertisement
LECTURE 5: INFORMATION
SECURITY POLICY, STANDARDS,
AND PRACTICES
Department of Computing and Information Sciences
College of Arts and Sciences
Mariano Marcos State University
CMPSC 147 : Information
Assurance and Security
Ralph Perdido
Instructor
OBJECTIVES
• Define
policies, practices,
standards, guidelines, and
procedures
• Know the function of policy
and its foundation for planning.
• Define and differentiate the
components of security policy.
• Types of security policy.
2
POLICY AS THE FOUNDATION FOR PLANNING
» Key Terms
• de facto standard a widely adopted or accepted standard by a public or group
rather than a formal standards organization. Contrast with a de jure standard.
• de jure standard a formally evaluated, approved, and ratified standard by a formal
standards organization. Contrast with a de facto standard.
• guidelines non-mandatory recommendations the employee may use as a
reference in complying with a policy.
• information security policy is a written policy on a organization provided by the
management to inform employees and others in a workplace about proper
behavior regarding the use of information and information assets.
• practices example of actions that illustrate compliance with policies.
3
POLICY AS THE FOUNDATION FOR PLANNING
» Key Terms
• procedures step-by-step instructions designed to assist employees in following
policies, standards, and guidelines.
• standard a detailed statement of what must be done to comply with policy.
4
POLICY AS THE FOUNDATION FOR PLANNING
» Example
Policy: Use strong passwords, frequently changed.
Guidelines: we recommend you don’t use family or pet names, or parts of your
Social Security number, employee number, or phone number in your password
Practices: according to X, most organizations require employees to change
passwords at least semi-annually.
Procedures: in order to change your password, first click the Windows Start button,
then….
Standards: must be at least 8 characters, with at least one number, one letter, and
one special character.
5
INFORMATION SECURITY POLICY, STANDARDS, AND PRACTICES
» Policy as the basis…
• Management from all communities of interest must make
policies the basis for all information security planning, design,
and deployment.
» What is policy?
• Policy direct how issues should be addressed and how
technologies should be used.
• Policies do not specify the proper operation of equipment or
software.
• Policy should never contradict law; policy must be able to stand
up in court, if challenged; and policy should be properly
administered through dissemination and documented
acceptance.
https://www.freepik.com/free-photosvectors/policy
6
INFORMATION SECURITY POLICY, STANDARDS, AND PRACTICES
» What is policy?
• Policies function like laws to dictate
acceptable and unacceptable behavior,
as well as penalties for failure to
comply.
» Security policy
• in governmental agencies views it as a
national security and national policies
in dealing with foreign state.
• In general; it is a set of rules that
protects an organization’s assets.
• Information security policy provides
rules
for
protection
of
the
organization’s information assets.
https://www.freepik.com/free-photosvectors/policy
7
INFORMATION SECURITY POLICY, STANDARDS, AND PRACTICES
» Information security policy
• Provides rules for protection of the organization’s information
assets.
» Types of Security Policy (by Special Publication (SP) 800-14 of the
National Institute of Standards and Technology (NIST)
1. Enterprise information security policies
2. Issue-specific security policies
3. Systems-specific security policies
8
INFORMATION SECURITY POLICY, STANDARDS, AND PRACTICES
» Criteria to be met in creating a policy
• Dissemination (distribution): the policy has been made readily
available for review by the employee. Hard copy and electronic
distribution.
• Review (reading): the policy has been disseminated in an intelligible
form, including versions for employees who are illiterate, readingimpaired, and unable to read English. Techniques: recording the
policy in English and other languages.
• Comprehension (understanding): the employee understand the
requirements and content of the policy. Techniques: quizzes and other
assessments.
• Compliance (agreement): the employee agrees to comply with the policy
through act or affirmation. Techniques: mouse click or key-stroke action to
acknowledge agreement.
9
INFORMATION SECURITY POLICY, STANDARDS, AND PRACTICES
» Criteria to be met in creating a policy
• Uniform enforcement (fairness in application): the policy has been
uniformly enforces, regardless of employee status or assignment.
10
INFORMATION SECURITY POLICY, STANDARDS, AND PRACTICES
Policies,
standards,
guidelines,
and
procedures
Example:
https://tinyurl.com/yyj8
ta7w
11
INFORMATION SECURITY POLICY, STANDARDS, AND PRACTICES
» Standards
• More detailed statements of what must be done to comply
with policy.
• Two types of standards
• de facto standards – may be informal or part of an
organizational culture. (e.g. use of QWERTY keyboard layout;
Breadcrumb trail on websites.)
• de jure standards – standards that may be published,
scrutinized, ratified by a group, formal standard. Established
by law. (e.g. TCP/IP; ASCII)
https://depositphotos.com/vectorimages/standards.html
12
TYPES OF SECURITY POLICY
» Enterprise Information Security Policy (EISP)
• The high-level information security policy that sets the strategic direction,
scope, and tone for all of an organization’s security efforts.
• Known as a general security, policy, organizational security policy, IT
security policy, or information security policy.
• Is an executive-level document.
• Guides the development, implementation, and management of the
security program.
• It defines the purpose, scope, constraints, and applicability of the security
program.
• Assigns responsibilities in system administrations, maintenance of info.
security policies, and the practices and responsibilities of users.
13
https://www.istockphoto.com/vector/securitypolicy-vector-icon-with-outline-colors-
TYPES OF SECURITY POLICY
» Enterprise Information Security Policy (EISP)
• Addresses legal compliance (by National Institute of Standards and
Technology):
1.
General compliance to ensure that an organization meets the requirements
for establishing a program and assigning responsibilities therein to various
organizational components.
2.
The use of specifies penalties and disciplinary action.
14
https://www.istockphoto.com/vector/securitypolicy-vector-icon-with-outline-colors-
TYPES OF SECURITY POLICY
» Enterprise Information Security Policy (EISP)
• EISP Elements
•
An overview of the corporate philosophy on security
• Information on the structure of the information security organization and people
who fulfill the information security role.
•
Fully articulated responsibilities for security that are shared by all members of
the organization (employees, contractors, consultants, partners, and visitors)
•
Fully articulated responsibilities for security that are unique to each role within
the organization.
15
https://www.istockphoto.com/vector/securitypolicy-vector-icon-with-outline-colors-
TYPES OF SECURITY POLICY
» Enterprise Information Security Policy (EISP)
• Components of the EISP
16
https://www.istockphoto.com/vector/securitypolicy-vector-icon-with-outline-colors-
TYPES OF SECURITY POLICY
» Enterprise Information Security Policy (EISP)
• Components of the EISP
17
https://www.istockphoto.com/vector/securitypolicy-vector-icon-with-outline-colors-
TYPES OF SECURITY POLICY
» Issue-Specific Security Policy (ISSP)
• policy that provides detailed, targeted guidance to instruct all members of
the organization in the use of processes or technologies.
• addresses specific areas of technology;
• requires frequent updates; and
• contains a statement about the organization’s position on a specific issue.
18
https://www.istockphoto.com/vector/securitypolicy-vector-icon-with-outline-colors-
TYPES OF SECURITY POLICY
» Issue-Specific Security Policy (ISSP)
• ISSPs may cover the following topics:
•
E-mail
•
Use of the Internet and World Wide Web
•
Specific minimum configurations of computers to defend against worms and viruses
•
Prohibitions against hacking or testing organization security controls
•
Home use of company-owned computer equipment
•
Use of personal equipment on company networks (BYOD: bring your own device)
•
Use of telecommunications technologies, such as fax and phone
•
Use of photocopy equipment
•
Use of portable storage devices: USB memory stick, backpack drives, games players, and
other device capable of storing digital files.
•
Use of cloud-based storage services that are not self-hosted by the organization or
engaged under contract; Google Drive, Dropbox, and Microsoft Live.
19
https://www.istockphoto.com/vector/securitypolicy-vector-icon-with-outline-colors-
TYPES OF SECURITY POLICY
» Issue-Specific Security Policy (ISSP)
• Three approaches in creating and manage ISSPs
1.
Independent ISSP documents, each tailored to a specific issue.
2.
A single comprehensive ISSP document that covers all issues.
3.
A modular ISSP document that unifies policy creation and administration while
maintaining each specific issue’s requirements.
20
https://www.istockphoto.com/vector/securitypolicy-vector-icon-with-outline-colors-
TYPES OF SECURITY POLICY
» Issue-Specific Security Policy (ISSP)
• Components of an ISSP
•
Statement of Policy
• Policy should begin with a clear statement of purpose
•
Authorized Access and Usage of Equipment
• Who can use the technology governed by the policy, and what it can be used
for.
•
Prohibited Use of Equipment
•
Unless a particular use is clearly prohibited.
• Systems Management
•
Focuses on the users’ relationship to systems management.
21
https://www.istockphoto.com/vector/security-policy-vector-icon-withoutline-colors-gm1155946177-314885904
TYPES OF SECURITY POLICY
» Issue-Specific Security Policy (ISSP)
• Components of an ISSP
•
Violations of Policy
• Violations of policy should carry penalties that are appropriate.
•
Policy Review and Modification
• Any document is only useful if it is up to date, each policy should contain
procedures and timetable for periodic review.
•
Limitations of Liability
•
Policy should state that if employees violate a company policy or any law using
company technologies, the company will not protect the, and the company is
not liable for their actions.
22
https://www.istockphoto.com/vector/security-policy-vector-icon-withoutline-colors-gm1155946177-314885904
TYPES OF SECURITY POLICY
» Systems-Specific Security Policy (SysSP)
• function as standards or procedures to be used when configuring or
maintaining systems.
• Two general groups of SysSPs
1. Managerial Guidance SysSPs
• a document created by management to guide the implementation and configuration of
technology.
• Example: following the firewall’s configuration guidelines established by the management.
2. Technical Specifications SysSPs
• systems administrator need to create a policy to implement the managerial policy.
• Example: user password must be changed quarterly; systems administrator can implement a
technical control within a specific application to enforce this policy.
23
https://www.istockphoto.com/vector/security-policy-vector-icon-withoutline-colors-gm1155946177-314885904
TYPES OF SECURITY POLICY
» Systems-Specific Security Policy (SysSP)
• Two general groups of SysSPs
2. Technical Specifications SysSPs
• Methods in implementing technical controls:
1. Access Control Lists (ACL) – consists of details
about user access and use permissions and
privileges for an organizational asset or resource.
• ACL regulations:
• Who can use the system
• What authorized users can access
• When authorized users can access the system
• Where authorized users can access the system
2. Configuration Rule Policies – govern how a security
system reacts to the data it receives. A rule-based
policy that may or may not deal with users directly.
Example: intrusion detection and
protection systems, proxy servers
24
POLICY MANAGEMENT
» Policy Management
• Policies are living documents that must be managed.
• Security policies must have:
• a responsible manager,
•
a schedule of reviews,
• a method for making recommendations for reviews, and
•
a policy issuance and revision date.
25
POLICY MANAGEMENT
» Policy Management
• A responsible manager
•
Often called as policy administrator—does not necessarily have to be proficient
in relevant technology, only moderate technical background.
• Schedule of Reviews
•
Policies retain their effectiveness if periodically reviewed for currency and
accuracy.
•
A policy should be reviewed annually.
• Review Procedures and Practices
• In facilitating policy review, the policy manager should have a mechanism
by which people make recommendations. (e.g., via e-mail, office mail,
dropbox)
26
POLICY MANAGEMENT
» Policy Management
• Policy and Revision Date
•
Policy must contain date of origin and the date(s) of any revision.
• Sunset clause – indicates expiration date of a policy.
• Automated Policy Management
• Automation can streamline the repetitive steps of writing a policy, tracking the
workflow of policy approvals, publishing policy, and tracking when employees
have read the policy.
27
LECTURE 5: INFORMATION
SECURITY POLICY, STANDARDS,
AND PRACTICES
Department of Computing and Information Sciences
College of Arts and Sciences
Mariano Marcos State University
CMPSC 147 : Information
Assurance and Security
Ralph Perdido
Instructor
Download