Lect 03
Lect 03
Objectives
http://fpt.edu.vn 1/6/2018 2
Compliance
http://fpt.edu.vn 1/6/2018 3
US-based Laws
• Federal Information Security Management Act (FISMA, 2002):
– mandates that the Federal government and its contractors follow a common set of
information security standards. The standards are set by the National Institute of
Standards and Technology (NIST).
• Health Insurance Portability and Accountability Act (HIPAA, 1996):
– establishes a large, complicated rule set for storing health information in a common
format, making it sharable, and making it a crime to share it with people who should not
have it.
• Gramm-Leach-Bliley Act (GLBA, 1999):
– also called the Financial Services Modernization Act; deregulated banks and financial
services, allowing each institution to offer banking, investments, and insurance services
– included three rules that affect privacy. The Financial Privacy Rule allows people to opt
out of having their data shared with partner companies, but it is usually implemented so
that it is easier to allow the sharing. The Safeguards Rule requires that companies have
data security plans. The Pretexting Rule tells institutions to implement procedures to
keep from releasing information to people who are trying to gain information under false
pretenses (pretexting).
http://fpt.edu.vn 1/6/2018 4
US-based Laws (cont.)
http://fpt.edu.vn 1/6/2018 5
Regulations Related to Compliance
http://fpt.edu.vn 1/6/2018 6
Regulations Related to Compliance (cont.)
http://fpt.edu.vn 1/6/2018 7
Organizational Policies for Compliance
• Fiduciary responsibility (important):
– An attorney and a client
– A CEO and a board of directors
– Shareholders and a board of directors
– Two steps can be taken: due care and due diligence
• Mandatory vacations
• Job rotation
• Separation of duties
• Acceptable use
http://fpt.edu.vn 1/6/2018 8
Standards and Guidelines for Compliance
• (Security) policy provides constraints of behavior for an organization’s
personnel as well as its information systems and other machinery:
– i.e. it specifies the activities that are required, limited, or forbidden in an organization.
• Policy effectiveness requires a top-down approach. An effective
security policy must be:
– approved by senior management
– communicated to employees
– periodically reviewed
– assessed for effectiveness
• The term Requirements usually refers to characteristics of an
information system or business process.
• Standards are mandatory requirements that support individual policies.
• Procedures are mandatory, step-by-step, detailed actions required to
successfully complete a task.
• Guidelines are recommendations for the regular and consistent
implementation of accepted practices.
http://fpt.edu.vn 1/7/2018 9
Standards and Guidelines for Compliance (cont.)
http://fpt.edu.vn 1/7/2018 10
Standards and Guidelines for Compliance (cont.)
http://fpt.edu.vn 1/7/2018 11
Basic COBIT Principle
http://fpt.edu.vn 1/6/2018 12
Standards and Guidelines for Compliance (cont.)
http://fpt.edu.vn 1/7/2018 13
ITIL Life Cycle
http://fpt.edu.vn 1/6/2018 14