Chapter04-Security Policy and Standards
Chapter04-Security Policy and Standards
Chapter 3
Security Policy and Standards
Part I
1. Introduction
2. Policy
3. Enterprise Information Security Policy
4. Issue-Specific Security Policy (ISSP)
5. System-Specific Policy
6. Guidelines for Policy Management
7. Another Approach to Policy Development
8. SP 800-18 Guide for Developing
1. Introduction
2. Policy
3. Enterprise Information Security Policy
4. Issue-Specific Security Policy (ISSP)
5. System-Specific Policy
6. Guidelines for Policy Management
7. Another Approach to Policy Development
8. SP 800-18 Guide for Developing
1. Introduction
2. Policy
3. Enterprise Information Security Policy
4. Issue-Specific Security Policy (ISSP)
5. System-Specific Policy
6. Guidelines for Policy Management
7. Another Approach to Policy Development
8. SP 800-18 Guide for Developing
Statement of Purpose:
Scope & Applicability
Definition of Technology Addressed
Responsibilities
more ...
Systems Management:
Management of Stored Materials
Employer Monitoring
Virus Protection
Physical Security
Encryption
more ...
Limitations of Liability:
Statements of Liability or Disclaimers
1. Introduction
2. Policy
3. Enterprise Information Security Policy
4. Issue-Specific Security Policy (ISSP)
5. System-Specific Policy
6. Guidelines for Policy Management
7. Another Approach to Policy Development
8. SP 800-18 Guide for Developing
1. Introduction
2. Policy
3. Enterprise Information Security Policy
4. Issue-Specific Security Policy (ISSP)
5. System-Specific Policy
6. Guidelines for Policy Management
7. Another Approach to Policy Development
8. SP 800-18 Guide for Developing
Should include:
How policies will be distributed
How verification of distribution will be
accomplished
Specifications for any automated tools
Revisions to feasibility analysis reports based on
improved costs & benefits as design is clarified
1. Introduction
2. Policy
3. Enterprise Information Security Policy
4. Issue-Specific Security Policy (ISSP)
5. System-Specific Policy
6. Guidelines for Policy Management
7. Another Approach to Policy Development
8. SP 800-18 Guide for Developing
more ...
Collect & read all existing internal infosec awareness material &
make a list of the included bottom-line messages
more ...
more ...
more ...
more ...
more ...
Why Policy?
Enterprise InfoSec Policy
Issue-Specific Security Policy
System-Specific Policy
Guidelines for Policy Development
1. Introduction
2. Security Standard Criteria and Product
Security Evaluation Process
3. Computer Products Evaluation Standards
4. Major Evaluation Criteria
Purpose
Criteria
Process
Structure
Outcome/benefit
Certification
Accreditation
Evaluation
Potential market benefit
A great product
For evaluator, cut down the evaluation cost
without cutting the value of evaluation
For buyer, result in good product to enhance the
security
Evaluation of a computer product can be
done using either a standard or a criteria
Three Objectives
A yardstick for user
Guidance for manufacturer
Basis for security requirements
Two requirements
Specific security feature requirements
Assurance requirements