Policies Procedures Ch5
Policies Procedures Ch5
Technical aspects of security are not the only things defined by policy. Policy also defines how employers & employees should behave when things fail or do not go as expected.
3
Information Policy I
The information policy defines what sensitive information should be protected The policy is constructed to cover all information within the organization Each employee is responsible for protecting sensitive information that comes into their possession.
Information Policy II
Critical issues include:
Identification of Sensitive Information Classifications of Sensitive Information Storing Sensitive Information Transmitting Sensitive Information Destroying Sensitive Information
Security Policy I
The security policy defines the technical requirements for security on computer systems & network equipment. The security policy defines how a system or network administrator should configure a system with regards to security. The primary responsibility for the implementation of this policy falls on the Administrator.
7
Security Policy II
Critical issues include:
Identification & Authentication Access Control Audit (number of logins, logout, failures etc) Network Connectivity
Dial-in Connections Permanent Connections Remote Connections Wireless Networks
Malicious Code What security programs to use. Encryption Which encryption algorithms to use.
8
10
11
E-mail Policy I
E-mail policy serves to limit use of bandwidth within an organization. E-mail policy clarifies what is allowable and non allowable transmission of data or information. Every E-mail user & the Administrator is responsible for ensuring Email is not being exploited.
12
E-mail Policy II
Critical issues include:
Internal mail Issues
Harassment Jokes Attachments
14
16
17
Backup Procedure
Defines how system backup are to be performed. Defines when system backup are to be performed. Defines the Frequency of system backups. Defines the media where backups are stored. Defines how Backups are protected Defines what system information/data needs to be backed up. Defines how often to conduct Restore Testing.
18
20
Policy Deployment
Unlike creating a policy (which requires a small number of people), Deploying a Policy requires the involvement of the whole organization. The normal procedure involves the following:
General Meeting with Everyone Educating Employees Providing Documentation Use of the Policy
24