Security Induction Training
Security Induction Training
Welcome and
Introduction
Introduction.
How Internet made our life Less Secure and why it is Important
Agenda
• CIA Triad
• Incident Management
• HR Policies
POLICIES
Information Security Policies Human Resources Policies
ATPL_POL_01_Information Security Policy
ATPL_POL_05_Access Control Policy
ATPL_POL_06_Password Policy Ver 1.1
ATPL_POL_12_Disciplinary Policy Ver 1.1
ATPL_POL_09_Human Resources Security Policy Ver 1.1
ATPL_POL_11_Clear Desk and Clear Screen Ver 1.1 ATPL_POL_03_Teleworking Policy Ver 1.1
ATPL-POL 13_Information Security Risk Management Policy Ver 1.1
ATPL-POL 14_Physical & Environmental Security Policy Ver 1.1
ATPL-POL 15_Anti-Malware Policy Ver 1.1
ATPL-POL 16_Secure Media Disposal Policy Ver 1.1
ATPL-POL 20_Asset Management Policy Ver 1.1
ATPL-POL 21 - Acceptable Use Policy Ver 1.1
ATPL-POL 23 - Disaster Recovery Policy Ver 1.1
An ISMS Policy is mandatory, and you can access all these policies using this link
https://shorturl.at/gsvAM
Title: Security Induction Training
Subtitle: Building a Secure Work
Environment
6
CIA Triad for
Employees
1. Confidentiality: Protecting Privacy
• Ensures sensitive information is kept private.
• Prevents unauthorized access to critical data.
• Safeguards personal, financial, and proprietary information.
7
Security Awareness
• Explain the significance of security awareness for both personal and
company data protection.
ATPL_POL_11
Clear Screen Policy-
• Please keep your desktop screen clean because saving any
file or documents on desktop screen is against the ISO
guidelines.
• Make a standard folder structure for storing your files on an
office laptop.
• Make sure your OneDrive is Created for regular backup of
important documents.
• Always keep windows defender on for viruses, threats,
malware, and ransomware protection, it is the first line of
defense for your machine
• Computer workstations must be locked when the workspace
is unoccupied.
Acceptable Use Policy
• Authorized Use: Company resources are for business purposes only; personal use is discouraged.
• Data Security: Safeguard sensitive information; follow data handling protocols.
• Internet Usage: Limited to work-related activities; no inappropriate content.
• Email Etiquette: Professional communication only; avoid spam or malicious content.
• Software Usage: Install approved software only; no pirated or unauthorized applications.
• BYOD (Bring Your Own Device): Secure personal devices used for work with company-approved software.
• Social Media: Responsible representation of the company online; avoid confidential info.
• Remote Work Security: Adhere to remote work guidelines, including VPN usage.
• Consequences of Violations: Violations lead to disciplinary actions, access suspension, legal consequences.
• Reporting Incidents: Promptly report any security breaches or violations to IT.
• Review and Updates: AUP reviewed annually for emerging threats and advancements.
• Employee Acknowledgment: All employees must sign AUP acknowledgment form.
10
Incident Management
11
Windows Defender Security
12
HR Policies
Disciplinary Policy-
• Formal Action
• Informal Action
Teleworking Policy-
• Employees should be available on Messenger
& Mail between general office hours (Between
09:30 AM – 07:30 PM) . Mon-FRI
• Employees working on different time zone
projects or clients should be available on
Messenger & Mail between time hours as
required by Leader/Project Manager.
• Employees are expected to login and logout
GreytHR on daily basis
HR Policies
• The roles and responsibilities of employees, contractors and third-
party users shall be defined and documented
• All the employees, contractors, and third parties shall agree to and
sign the terms and conditions of the appointment and non-disclosure
agreement, which include their organizational responsibilities for
information security during and after the contract term.