Security Policies and Procedures

  • Security frameworks

    • NIST

    • ISO

    • TOGAF

    • SABSA

    • COBIT

    • ITIL

  • Prescriptive Frameworks – Backed by regulations or compliance requirements.

    • COBIT

    • ITIL

    • ISO

    • PCI DSS

    • Level of implementation:

      • First: risk assessments

      • Second: policies and procedures

      • Third: continuous monitoring

  • Risk Based Frameworks

    • There is no universal framework that applies to everyone

    • NIST is made up of:

      • Framework core: identify, protect, detect, respond, recover

      • Implementation tiers (maturity): partial, risk informed, repeatable, adaptive

      • Framework profiles (what do we need?)

  • Framework Contents

    • Acceptable Use Policy

      • How you can use resources

      • Must be enforced

    • Code of Conduct

      • Authorized job functions

      • Protect data

      • Follow requirements

      • Respect privacy

    • Privacy

      • Expected but needs balance

      • Must be enforced

      • Surveillance for security assurance, monitoring data, or physical monitoring

    • Ownership

      • You create the data, you own it

      • Data classification

      • Privileged users

    • Backup Policy

      • Short term

      • Long term

      • Destruction

    • Job related security.

      • Separation of duties

      • Job rotation

      • Mandatory vacation

      • Dual control

      • Least privilege

  • Corporate Policies

    • Upper management

    • Legal standpoint

    • Department-based

  • Procedures – list of steps

    • Examples

      • Compensating control

      • Continuous monitoring

      • Documentation

      • Control testing before implementation

      • Change management

      • Patching, updating

      • Retiring technology

  • Procedure Exceptions

    • How do you handle procedure exceptions?

      • Document them

      • Who, what, reasons, risk assessment, duration, review

Last updated