Lecture 14 Information Security Policies
Lecture 14 Information Security Policies
Security
Policies
Policy, Standards, and Procedures
Policy: document that states in writing how a company plans to
protect its physical and information technology assets.
◼
• Policies require constant modification and maintenance
• To produce a complete information security policy, management
must define three types of information security policy (NIST 800-14):
- Capability Table: similar method that specifies which subjects and objects
users or groups can access
◼ Misalignment often happens when the CISO (Chief Information Security Officer)
does not have an equal voice in the enterprise and when the security function is
not able to guide or even have discussions with other executives and the board to
establish the enterprise's tolerance for risk.
◼ Such situations are much more likely to lead to CISOs and CIOs having competing
priorities that push them apart rather than help them align toward common
objectives
Policy Misalignment Impact (cont’d)
Impact of any misalignment of IT security with organizational policy
◼ Misalignment of organizational policy with IT security can cause conflict in the system,
which leads to exposure in the system that could be taken advantage of.
◼ Also, misalignment could lead to the employees not knowing what to do, if the policies
instruct the employees on doing a specific behavior and then the IT security blocks that
behavior, the employee will end up lost.
◼ The misalignment in policies will result in destruction of the system's security, making
it simple to breach or violate, leading to the loss of private data in the data center
and servers but also destroying the company's reputation, making it impossible to
maintain the continuity of the entire enterprise.
Main components of DRP
◼ DRP team: This team is responsible for developing and implementing the
disaster recovery plan.
◼ A DRP team can provide valuable insights and expertise that can help
smoothly recover from a disaster more effectively.
◼ Additionally, a DRP team can help smoothly identify and mitigate risks
associated with its disaster recovery plan.
Main components of DRP
◼ RTO: The recovery time objective (RTO) is the amount of time that a business
process must be restored after a disruption.
◼ The RTO should be realistic and achievable and should be based on the impact
of the disruption on the business.
◼ It ensures that systems and data are recovered within a specific timeframe. This
is especially important for businesses that rely on their systems to function
properly.
◼ By including RTO in the disaster recovery plan, the company can be sure that its
systems will be up and running quickly in the event of a disaster.
Main components of DRP
◼ RPO: The recovery point objective (RPO) is the maximum amount of data that
can be lost in a disaster.
◼ The RPO should be based on the tolerable amount of data loss for the
business.
◼ RPO can help prevent data loss, ensure timely recovery of data, and improve
the overall efficiency of the disaster recovery process.
◼ Additionally, RPO can help to ensure that the disaster recovery plan meets all
applicable regulatory requirements.
Main components of DRP
◼ Backups: Backups are essential for recovering data after a disaster.
◼ Another reason is that backups can help ensure that data is available if a system
goes down.
◼ Additionally, backups can help reduce the amount of time it takes to recover
from a disaster. 26
Main components of DRP
◼ Documentation: The disaster recovery plan should be well-documented, so that
it can be easily followed in the event of a disaster.
◼ The documentation should include procedures for all aspects of the plan, such
as data backup and recovery, system failover, and communication.
◼ Without documentation, the plan may not be effective or may not be followed
correctly.
◼ Documentation also allows for review of the plan as needed, which is essential
to keeping the plan up-to-date and effective.
Main components of DRP
◼ Automation: Automation can help to reduce the time and effort required to
implement the disaster recovery plan.
◼ Automation can be used for tasks such as backing up data, failing over to a
standby system, and sending notifications.
◼ Additionally, automation can help to reduce the amount of human error that
can occur during the disaster recovery process.
Organizations security protection Procedures
◼ Authentication protocols: It is usually used to prove that this person is the owner of
the account, and that this data belongs to him. In the past, it was one-factor
authentication, which required the user to enter one thing of identifying information such
as a password. Recently, organizations are using multifactor authentication, It requires
the user to enter a passcode and an additional code and is often sent to his mobile phone.
Organizations security protection Procedures
Procedures to protect business critical data
◼ Encrypt data: It transforms data into another type or form so that only people who have
access to the decryption key can read and translate it. In this period, institutions use it a
lot and protect customer records such as credit card information or personal information
because it is one of the most widely used security methods.
◼ Data backup: Backup is the prosses of making a copy of the data to a secondary
location for save it in case of losing the original data, deletion, or disaster, which is
then restored. It is also a key component of the Disaster Recovery Plan and Business
Continuity Strategy, and it must be protected.
Organizations security protection Procedures
Procedures to protect equipment
◼ Staff awareness: Damage to equipment is often the result of unqualified personnel trained to use it;
Therefore, it is important to train employees to mitigate these damages, and if they are trained
correctly, their job performance will improve, and they will become more aware and take
precautions with machines. It also builds the employee’s self-confidence so that he performs his job
better because it thus addresses their weaknesses.
◼ Antivirus software: It quickly detects and removes malware, by scanning data such as web pages,
files and programs, thus protecting the device from harmful data that could damage data, sabotage
or slow down the device, in addition to checking emails and deleting viruses. If any. Some antivirus
programs also prevent the device from overheating. Antivirus software must be kept up to date
with the latest viruses and must be turned on regularly or set to scan for viruses every day.
Organizations security protection Procedures
Procedures to protect equipment
• Firewalls: The firewall is important in the network and has become the basis of
its security because it affects the modern and widely used security technologies.
By a set of rules that identify and prevent threats, firewalls scan traffic to prevent
unauthorized access to the network, and the firewall’s function is also to maintain
a log of events that administrators can use to improve the set of rules. The rules
should be updated regularly to keep pace with cybersecurity threats.