Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.

Slides:



Advertisements
Similar presentations
Software Quality Assurance Plan
Advertisements

Radiopharmaceutical Production
The New GMP Annex 11 and Chapter 4 Deadline for coming into operation: 30 June 2011.
Software Quality Assurance Plan
CS 411W - Notes Product Development Documentation.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
6-1 Full and Fair Reporting Electronic Presentation by Douglas Cloud Pepperdine University Chapter F6.
CST 481/598 x.2.  Broad overview of policy material  What is a “process”  Tiers (not tears) Many thanks to Jeni Li.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Information Security Risk.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 General Policy and Law Issues.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline General Policy.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Creation of Policies, Part.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Quantitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Managing Risk in Information Systems Strategies for Mitigating Risk
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Your High-Level Overview of the Components Provided by ESP Solutions Group Disaster Prevention and Recovery.
Examine Quality Assurance/Quality Control Documentation
HOW TO WRITE A GOOD TERMS OF REFERENCE FOR FOR EVALUATION Programme Management Interest Group 19 October 2010 Pinky Mashigo.
Module 1, Part 1: Introduction and The VMP Slide 1 of 22 © WHO – EDM Validation Supplementary Training Modules on Good Manufacturing Practices.
Complying With The Federal Information Security Act (FISMA)
Information Security Compliance System Owner Training Richard Gadsden Information Security Office Office of the CIO – Information Services Sharon Knowles.
International Auditing and Assurance Standards Board The Clarified ISAs, Audit Documentation, and SME Audit Considerations ISA Implementation Support Module.
Documenting Software Architectures
1 Our Expertise and Commitment – Driving your Success An Introduction to Transformation Offering November 18, 2013 Offices in Boston, New York and Northern.
FORESEC Academy FORESEC Academy Security Essentials (II)
Organize to improve Data Quality Data Quality?. © 2012 GS1 To fully exploit and utilize the data available, a strategic approach to data governance at.
Chapter 07 Internal Control McGraw-Hill/IrwinCopyright © 2014 by The McGraw-Hill Companies, Inc. All rights reserved.
Software Requirements Engineering CSE 305 Lecture-2.
Dobrin / Keller / Weisser : Technical Communication in the Twenty-First Century. © 2008 Pearson Education. Upper Saddle River, NJ, All Rights Reserved.
1 Common Criteria Ravi Sandhu Edited by Duminda Wijesekera.
Communication 2 Report Writing.
Environmental Management System Definitions
IT Incident Response The goals How to achieve this Policies Standards Architecture People Process & Technology What can we really.
Environmental Management Plan (EMP) Required for: Full EIA based on Palestinian EIA Policy Category A projects based on World Bank Policy.
Strategic Approaches to Improving Ethical Behavior
Project quality management. Introduction Project quality management includes the process required to ensure that the project satisfies the needs for which.
ISO DOCUMENTATION. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to:  Name.
Compliance Audit Subcommittee Reporting Work Plan Copenhagen, Denmark 6th of May 2010.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
©Dr. Respickius Casmir Network Security Best Practices – Session 2 By Dr. Respickius Casmir.
ISO Registration Common Areas of Nonconformances.
ISO DOCUMENT CONTROL. ISO Environmental Management Systems2 Lesson Learning Goals At the end of this lesson you should be able to: 
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Dobrin / Weisser / Keller: Technical Communication in the Twenty-First Century. © 2010 Pearson Education. Upper Saddle River, NJ, All Rights Reserved.
Company LOGO. Company LOGO PE, PMP, PgMP, PME, MCT, PRINCE2 Practitioner.
Information Security Policy Development for Management By Peter McCarthy.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Security Methods and Practice Principles of Information Security, Fourth Edition CET4884 Planning for Security Ch5 Part I.
EIAScreening6(Gajaseni, 2007)1 II. Scoping. EIAScreening6(Gajaseni, 2007)2 Scoping Definition: is a process of interaction between the interested public,
Page 1 | Proprietary and Copyrighted Information Safeguards Gary Hannaford, Task Force Chair IESBA Meeting New York, USA June 29 – July 1, 2015.
Copyright © 2011 Pearson Canada Inc. Auditing: The Art and Science of Assurance Engagements Chapter 2: The Public Accounting Profession.
© ITT Educational Services, Inc. All rights reserved. IS4680 Security Auditing for Compliance Unit 1 Information Security Compliance.
Software Project Configuration Management
Chapter 1 - Introduction
IS4680 Security Auditing for Compliance
Quality Management Systems (QMS)
Project Management Process Groups
Importance of Law and Policies in the Environmental Management System
Requirements Document
ISO 9001:2008 – Key Changes NOTE: use of this webinar depends on the instructor/speaker using the text in the notes of the slides!! Examples and speaking.
Radiopharmaceutical Production
Presentation transcript:

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information Security Policy Module 1: Purpose Module 2: Life Cycle Module 3: Terminology  Module 4: Structure Module 5: Summary

Module 4 Structure

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 3 Students should be able to: –Create a general security policy program. –Know what the components of a security policy program, issue-specific policy, and acceptable use guidelines are. Structure Learning Objectives

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 4 Structure Security Policy Outline Security Program Policy Issue-Specific Policy System-Specific Policy Information Security Policy Acceptable Use Guidelines Issue-Specific Policy System-Specific Policy High-Level Low-Level

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 5 Structure Security Program Policy Security Program Policy Information Security Policy Purpose Definitions Scope Issue-Specific Policy Summaries Roles & Responsibilities References A security program policy is a high-level policy which contains general rationale and purpose of an information security policy, was well as related definitions, roles and responsibilities, and compliance. Policy Statement Introduction Relevant Resources

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 6 Structure Security Program Policy: Introduction Purpose –The purpose usually contains the rationale for why the information security policy is being created. Policy Statement –The policy statement describes organizational values and philosophy on issues detailed within the security policy. Scope –The scope details application constraints of the information security policy. For example, it can specify the departments, personnel, and systems that it will impact. This is usually determined as a result of a risk analysis.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 7 Structure Security Program Policy: Issue-Specific Summaries While the introductory sections of the security policy should be created first, most of the Security Program Policy should be developed after issue-specific and system-specific policies. Issue-Specific Summaries go through all of the issue-specific policies defined throughout the entire security policy and give a top-level overview.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 8 Structure Security Program Policy: Roles & Responsibilities The roles and responsibilities section list relevant personnel and the responsibilities they have related to the information security policy. These responsibilities and role definitions usually include: –Development, maintenance, and publication of present and future policy –Creation and decision of relevant procedures for policies –Implementation of policies –Enforcement of policies (dealing with violations) –Monitoring and auditing of compliance –User responsibilities

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 9 Structure Security Program Policy: Relevant Resources References –Pertain to past policies which the information security policy supersedes, related legislation and laws, other relevant organizational policies or guidelines, and international standards. –These may be listed in the form of a link or citation. –These are useful in providing the context for an information security policy. Definitions –Clarify the meaning of terms (e.g. general information security, information technology, and specific roles). –Definitions should be concise and easy- to-understand in order to be effective. –The point of including definitions is to avoid misunderstandings in language and to provide a frame of reference.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 10 Structure Low-Level Policy Issue-Specific Policy System-Specific Policy Information Security Policy Background/Rationale Sub-Category Description Implementation Procedures Enforcement Procedures Background/Rationale Description References Evaluation Procedures Definitions Guidelines

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 11 Structure Low-Level Policy: Issue-Specific Issue-Specific policies usually focus on areas defined by a previous risk analysis and usually differ from organization to organization. However, all issue-specific policies do share common elements, despite variations in order or location within a document. They contain multiple sections, but should begin with an initial description of what the controls constitute (sub- categories), why they are important for the organization, and the associated risks that they impact.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 12 Structure Low-Level Policy: Sub-Category General Issue-Specific policies are usually higher-level areas of security controls, which contain sub-categories. Sub-categories of issue-specific policies will also contain description and background and associated risks. In addition, similar to the issue-specific policy higher-level, there may be references to other documents, organizational processes, etc. as well as defined terms for clarification purposes.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 13 Structure Low-Level Policy: Sub-Category Specific They also tend to include: –Specific guidelines which reference responsibilities and roles and are dependent on the sub-category. These can also include acceptable use guidelines. –Procedures for implementation (includes responsibilities and roles; instructions; guidelines; standards; system-specific steps; as well as training and awareness programs) –Procedures for enforcement (includes responsibilities and roles, reporting procedures and procedures for dealing with violations) –Procedures for evaluation (includes processes for evidence/documentation for evaluation, schedule for auditing, monitoring methods, auditing methods)

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 14 Structure Acceptable Use Guidelines Information Security Policy Acceptable Use Guidelines Acceptable Use Guidelines, like the Security Program Policy is considered a high-level policy. It is basically a summary of all acceptable use guidelines and can be categorized by the issue that they are specific to and/or to whom they apply. Acceptable Use Guidelines are usually compiled and distributed within pamphlets to regular users who neither need nor want detailed implementation and/or enforcement procedures and simply want to know what they may and may not do so that they do not cause damage to themselves or the organization.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 15 Structure Exercise A good way of applying what has been learned in this module would be to view a genuine security program policy. In a linked zip file you should find the following: –“Business & Finance Bulletin IS-3 Electronic Information Security”, which is a security program policy from the University of California. –“HEP-C Alert, Inc. General Security Policy” from the company HEP-C Alert, Inc. –“Cyber-Security Policy P03-002”, version 2.0 of a security program policy for New York State government agencies. –“Government Security Policy”, a security program policy for the Canadian government. While there are some differences in the application, it is apparent that the main aspects of the security program policy detailed are contained within all of these documents.

Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 16 An information security policy is made up of high-level policies (security program policy and acceptable use guidelines) as well as low-level policies (issue-specific and system-specific). A security program policy contains: –Purpose, Policy Statement, Scope, Issue-Specific Policy Summaries, Roles and Responsibilities, References, and Definitions. An issue-specific policy can contain sub-categories. Both of these contain a definition, rationale, references, and definitions. However, the sub-categories also tend to contain acceptable use guidelines, and specific procedures for implementation, enforcement and evaluation. Structure Summary