Security Implementation Plan - nts201 Diley
Security Implementation Plan - nts201 Diley
Program
Nicholas Diley
Implementation Plan
RISK ASSESSMENT
One of the first steps of implementing information security is the assessment of risk
in the workplace, while assessing everything that comes with it. Risk assessment
can be summed into three major components:
1. Threat Assessment
2. Vulnerability Assessment
3. Asset Identification
We need to identify the risks of what we are caring for, and the possibility for
outside entrance either through connection, or perhaps the loss of data that would
come with employees discussing matters outside of the confidentiality of the
workplace. These all pose risks and must be assessed for. Simple matters can be
contained in various plans, below will be a handful of procedures to comply with risk
assessment and protection:
Based on the Risk Assessment of your information, you can create the means of
protecting the data by implementing systems that would correspond to that which
you are protecting. It is best to educate the employees about proper procedures to
take involving security, such as proper password etiquette, to not disclose
confidential data to outside sources, and secure the user accounts.
You need a general idea of how important the asset is to the organization in order to
justify to management the cost of the security controls. In addition to cost, you
need to have an understanding of which area of CIA warrants the most attention,
and thus security controls. You need to develop a rating system for confidentiality,
integrity, and availability that can be applied across your enterprise. Your
companys latest research project data may have the highest level of confidentiality
whereas your e-commerce website may be most affected by availability
could pose a problem. There are differences of opinion these days about how to
establish a security management structure. Some feel there needs to be a Chief
Information Security Officer (CISO) that reports directly to the head of the
organization. Others feel the security program should be run out of the Office of the
Chief Information Officer (CIO) and the top security official should report directly to
the CIO. There are differences of opinion these days about how to establish a
security management structure. Some feel there needs to be a Chief Information
Security Officer (CISO) that reports directly to the head of the organization. Others
feel the security program should be run out of the Office of the Chief Information
Officer (CIO) and the top security official should report directly to the CIO.
Regardless of the setup, there is the need for those who will develop the security
programs, and the staff to make sure they are upheld and being implemented
properly. This pyramid of sorts designates the management of the administrative
and operational aspects of security, so that they may be implemented properly.
Depending on the size of the organization, there can also be information systems
security managers that manage and coordinate the various activities of their ISSOs.
They also act as a liaison between the central security office and the individual
system security officer.
Background checks
Reinvestigations
Nondisclosure agreements
Regular vacations and shift rotations
Termination and Transfer Procedures
a. Return of equipment, ID, keys, etc.
b. Termination of User IDs and Passwords
c. Identifying Non-Disclosure period effectiveness
6. Skills needed are identified in job descriptions and employees are rated
against those skills
7. Employee has a training plan and training is documented and monitored
When working with critical information, it is important to see the background of the
person that you would be hiring onto staff, to allow for the ease of mind to be able
to work with the personnel respectively. Having different levels of access is
appropriate for this sort of work as well, as we need to implement the means
necessary to have those who need to access certain information, to be able to do
so. Some users may not need the same levels of access, of which they can be set
up accordingly.
Physical security is equally as important as the Digital security and means must be
attributed as such.
Media Sanitization/Disposal
o Is your data sensitive, so that it should not be obtainable upon
disposal?
What method do you use to dispose of data?
Hard Drive (Triple Overwrite, degauss)
Tapes (degauss)
CDs (Incinerate, chemically destroy)
Paper (Shred (Diamond))
Physical Environment
o Are your servers in a locked room with tight access controls?
o What kind of access controls does your building have?
o Are there any special considerations that need to be taken into
o
It is important to make sure that circumstances are accounted for, whether it be the
placement or location of the building and proper failures or disasters. There should
be means to make sure that the servers are located in a room secure from the
outside elements, including breaking into by normal means. This idea enforces
against the idea of windows, and allowing for the means of physical security on the
premises at all times to make sure that the building Is secure. Some of these means
might include personal guards, security cameras with uninterrupted feed, contact
with local law enforcement and/or miniguns.
Personnel Security
o Are your users trained on the security of this system or have they
o
Works Cited:
Garbars, K. (n.d.). Implementing an Effective IT Security Program. . Retrieved July 14, 2014, from
http://www.sans.org/reading-room/whitepapers/bestprac/implementing-effective-security-program-80
Kadel, L. (2004, March 24). Designing And Implementing An Effective Information Security Program:
Protecting The Data Assets Of Individuals, Small And Large Businesses. . Retrieved July 14, 2014,
from http://www.sans.org/reading-room/whitepapers/hsoffice/designing-implementing-effectiveinformation-security-program-protecting-data-assets-of-1398