Assignment 2 - Frontsheet - Security
Assignment 2 - Frontsheet - Security
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
❒ Summative Feedback: ❒ Resubmission Feedback:
B. Content
I. P5 Review risk assessment procedures in an organisation.
1. Define a security risk and how to do risk assessment
2. Define assets, threats and threat identification procedures, and give examples
a) Assets:
Physical Assets: Tangible items such as buildings, equipment, vehicles, and inventory.
Information Assets: Data, intellectual property, proprietary information, software, and
digital assets.
Human Assets: Employees, contractors, stakeholders, and reputation.
Examples:
Physical Asset: Office premises, production machinery, company vehicles.
Information Asset: Customer databases, financial records, patents, software.
Human Asset: Skilled employees, management expertise, brand reputation.
b) Threats:
Human Threats: Actions or behaviors by individuals or groups with malicious intent, such
as hackers, disgruntled employees, or competitors.
Natural Threats: Environmental events or disasters, such as earthquakes, floods, fires, or
severe weather conditions.
Technical Threats: Risks arising from technology, including malware, viruses, system
failures, or data breaches.
Operational Threats: Risks associated with internal processes, errors, or failures, such as
supply chain disruptions, equipment failures, or human errors.
Examples:
Human Threat: Insider threat (an employee stealing sensitive data), phishing attacks by
cybercriminals.
Natural Threat: Floods damaging physical infrastructure, earthquakes disrupting operations.
Technical Threat: Ransomware infecting computer systems, denial-of-service (DoS) attacks.
Operational Threat: Supply chain disruptions due to transportation issues, power outages
halting production.
Examples:
Conducting vulnerability scans to identify weaknesses in network infrastructure.
Monitoring online forums and threat intelligence feeds for information on new malware
variants.
Analyzing past security incidents to identify common attack vectors and patterns.
Consulting with employees, IT professionals, and security experts to assess potential risks
and vulnerabilities.
Performing penetration tests to simulate real-world attack scenarios and identify weaknesses
in security controls.
Asset Identification: Identify and catalog all assets within the organization that need
protection. This includes physical assets, information assets, and human assets.
Threat Identification: Identify potential threats that could exploit vulnerabilities and cause
harm to the organization's assets. Threats can be categorized as human, natural, technical, or
operational.
Vulnerability Assessment: Assess vulnerabilities or weaknesses in systems, processes, or
infrastructure that could be exploited by identified threats.
Risk Analysis: Analyze the potential impact and likelihood of each identified risk. Consider
the consequences of a risk occurring and the probability of it happening.
Risk Prioritization: Prioritize risks based on their significance and potential impact on the
organization. This helps in focusing resources on addressing the most critical risks first.
Risk Documentation: Document all identified risks along with their potential impact,
likelihood, and prioritization. This creates a record that can be used for further analysis and
decision-making.
Stakeholder Involvement: Involve relevant stakeholders in the risk identification process.
This may include employees, management, customers, suppliers, and external partners.
Historical Data Analysis: Review past incidents, breaches, or near-misses to identify
recurring patterns or trends. This can help in predicting future risks and vulnerabilities.
Threat Intelligence Gathering: Monitor external sources for information on emerging threats,
vulnerabilities, and attack techniques. Stay updated with the latest developments in the threat
landscape.
Scenario Analysis: Consider various hypothetical scenarios to understand potential risks and
their impacts. This helps in preparing for different contingencies and developing effective risk
mitigation strategies.
Expert Consultation: Seek input from subject matter experts, such as security professionals,
risk managers, and industry specialists, to identify potential risks and vulnerabilities.
Continuous Monitoring: Establish mechanisms for continuously monitoring the organization's
environment for new risks and changes in existing risks. Risks are dynamic and can evolve
over time, so ongoing vigilance is essential.
Overall, data protection and security regulations play a vital role in safeguarding individuals' privacy,
preventing data breaches, promoting trust in digital transactions, and ensuring ethical and responsible use
of data in an increasingly interconnected world. Compliance with these regulations is essential for
organizations to protect their customers, mitigate risks, and maintain a competitive edge in the
marketplace.
Discussion:
Scope and Objectives:
A security policy should clearly define its scope, outlining the assets and resources it aims to
protect, such as information systems, data, facilities, and personnel. It should also articulate the
objectives of the policy, such as ensuring confidentiality, integrity, and availability of information,
complying with regulatory requirements, and maintaining business continuity.
The policy should specify the roles and responsibilities of various stakeholders within the
organization regarding security management. This includes defining the responsibilities of
executives, managers, employees, IT staff, security personnel, and third-party vendors in
implementing and enforcing security measures.
Risk Management:
The policy should address risk management principles and procedures, including risk assessment,
risk mitigation strategies, and risk monitoring and reporting. It should outline the organization's
approach to identifying, evaluating, and mitigating risks to its assets and operations.
Access Control:
Access control policies should be established to regulate access to sensitive information, systems,
and facilities. This includes defining user access levels, authentication mechanisms, password
management guidelines, and access control lists to restrict access based on user roles and
permissions.
Data Protection:
The policy should include measures for protecting sensitive data from unauthorized access,
disclosure, alteration, or destruction. This may involve encryption, data classification, data
handling procedures, data backup and recovery processes, and data retention policies.
Physical Security:
Physical security policies should address measures to protect physical assets, facilities, and
premises from unauthorized access, theft, vandalism, or damage. This includes implementing
security controls such as access controls, surveillance systems, alarm systems, and physical
barriers.
The policy should outline procedures for responding to security incidents, breaches, or violations
promptly. This includes incident detection, containment, eradication, recovery, and post-incident
analysis. It should also specify reporting requirements to relevant stakeholders, regulatory
authorities, and law enforcement agencies.
Compliance and Enforcement:
The policy should ensure compliance with relevant laws, regulations, industry standards, and
contractual obligations related to security and privacy. It should establish mechanisms for
enforcing the policy, conducting audits, assessing compliance, and imposing disciplinary actions
for non-compliance.
The policy should emphasize the importance of security awareness and training programs for
employees and stakeholders. This includes providing regular training sessions, security awareness
materials, and promoting a culture of security throughout the organization.
The policy should be reviewed and updated regularly to adapt to changing threats, technologies,
business requirements, and regulatory landscape. This ensures that the policy remains relevant,
effective, and aligned with the organization's security objectives and priorities.
Example: "The scope of this security policy encompasses all information systems, data, facilities,
and personnel owned or operated by XYZ Corporation. The primary objectives of this policy are to
ensure the confidentiality, integrity, and availability of information, comply with regulatory
requirements, and mitigate risks to the organization's assets."
Example: "Executive leadership is responsible for establishing the overall security strategy and
providing resources for its implementation. IT administrators are responsible for configuring and
maintaining security controls on information systems. Employees are responsible for adhering to
security policies and reporting any security incidents or violations to the appropriate authorities."
Risk Management:
Example: "Risk assessments will be conducted annually to identify and evaluate potential risks to
the organization's assets. Mitigation strategies will be developed and implemented based on the
findings of the risk assessments. Risks will be monitored regularly, and updates to mitigation
strategies will be made as necessary."
Access Control:
Example: "Access to sensitive information systems will be restricted to authorized users only. User
access levels will be defined based on job roles and responsibilities. Multi-factor authentication
will be required for remote access to the organization's network. Access control lists will be used
to restrict access to specific files, folders, and directories."
Data Protection:
Example: "Sensitive data will be encrypted both at rest and in transit using industry-standard
encryption algorithms. Data classification labels will be applied to categorize data based on its
sensitivity level. Data handling procedures will be established to govern the collection, storage,
transmission, and disposal of sensitive data."
Physical Security:
Example: "Access to corporate facilities will be controlled using electronic access control systems
and monitored through surveillance cameras. Security guards will be stationed at entry points to
verify the identity of visitors and enforce access policies. Intrusion detection systems will be
deployed to detect unauthorized access attempts."
Example: "An incident response team will be designated to investigate and respond to security
incidents promptly. Incident response procedures will include steps for incident detection,
containment, eradication, recovery, and post-incident analysis. Security incidents will be reported
to management, regulatory authorities, and affected individuals as required by law."
Example: "The organization will comply with relevant data protection laws, such as the General
Data Protection Regulation (GDPR) and the Health Insurance Portability and Accountability Act
(HIPAA). Regular audits will be conducted to assess compliance with security policies and
regulatory requirements. Non-compliance may result in disciplinary actions, including termination
of employment or legal sanctions."
Example: "All employees will receive annual security awareness training to educate them about
security policies, procedures, and best practices. Training materials, including e-learning modules
and informational posters, will be provided to reinforce security awareness throughout the
organization. Employees will be encouraged to report security concerns and participate in security-
related activities."
3. Give the must and should that must exist while creating a policy
Must:
Statement of Purpose: The policy must clearly articulate its purpose and objectives, outlining why
it's necessary and what it aims to achieve.
Scope: Define the scope of the policy to specify the assets, resources, or activities it covers and
those it does not.
Roles and Responsibilities: Clearly define the roles and responsibilities of individuals or groups
involved in implementing and adhering to the policy.
Compliance Requirements: Identify relevant laws, regulations, standards, or contractual
obligations that the policy must comply with.
Enforcement Mechanisms: Establish mechanisms for enforcing the policy, including consequences
for non-compliance or violations.
Review and Update: Specify regular review intervals and procedures for updating the policy to
ensure its relevance and effectiveness over time.
Training Requirements: Mandate training for employees to ensure they understand the policy and
their obligations under it.
Should:
Risk Management Considerations: Policies should consider risk management principles and
include provisions for risk assessment, mitigation, and monitoring.
Access Controls: Policies should recommend access control measures, such as authentication
mechanisms and authorization processes.
Data Protection Measures: Include recommendations for data protection measures, such as
encryption, data classification, and secure data handling practices.
Incident Response Procedures: Recommend incident response procedures for detecting,
containing, and responding to security incidents.
Monitoring and Auditing: Recommend monitoring and auditing procedures to assess compliance
with the policy and detect security breaches.
Continuous Improvement: Policies should encourage a culture of continuous improvement,
suggesting mechanisms for feedback, evaluation, and adaptation.
Communication and Awareness: Recommend communication strategies to promote awareness of
the policy among employees and stakeholders.
While "must" elements are non-negotiable and essential for the policy's effectiveness and legality,
"should" elements represent best practices or recommendations that enhance the policy's
comprehensiveness and effectiveness. Depending on the organization's specific needs and requirements,
additional "should" elements may be included to address specific risks or challenges.
4. Explain and write down elements of a security policy, including the main
components of an organisational disaster recovery plan
Security Policy:
Policy Statement:
o Define the roles and responsibilities of individuals or groups involved in security management.
o Include responsibilities for executives, managers, employees, IT staff, and security personnel.
Risk Management:
Access Control:
o Specify access control measures to regulate access to sensitive information and systems.
o Define user access levels, authentication mechanisms, and access control lists.
Data Protection:
o Include measures for protecting sensitive data from unauthorized access, disclosure, or
modification.
o Address encryption, data classification, data handling procedures, and data retention policies.
Physical Security:
o Mandate security awareness training for employees to educate them about security policies and
best practices.
o Promote a culture of security throughout the organization.
o Specify regular review intervals and procedures for updating the policy.
o Ensure the policy remains relevant and effective in addressing emerging threats and changing
business needs.
Risk Assessment:
Emergency Response:
Communication Plan:
o Establish a communication plan for notifying stakeholders and coordinating response efforts.
o Include contact information for key personnel, emergency services, and vendors.
o Identify alternate sites and infrastructure for business continuity and disaster recovery operations.
o Ensure availability of necessary resources, such as power, connectivity, and equipment.
o Develop a testing and training program to validate the effectiveness of the disaster recovery plan.
o Conduct regular drills and exercises to train personnel and identify areas for improvement.
o Maintain documentation of the disaster recovery plan, including procedures, contact lists, and
recovery strategies.
o Generate reports after drills and exercises to document findings and recommendations for
improvement.
o Regularly review and update the disaster recovery plan to address changes in business
requirements, technology, and risk landscape.
o Ensure the plan remains current and effective in mitigating the impact of disasters on business
operations.
o Clearly define the purpose of the policy and its scope, specifying the assets, resources, or activities
it covers.
o Identify the objectives and goals the policy aims to achieve.
Gather Requirements:
o Conduct stakeholder analysis to identify the needs, expectations, and concerns of relevant
stakeholders.
o Gather input from subject matter experts, department heads, legal advisors, and other relevant
parties.
Research and Benchmarking:
o Research industry best practices, standards, and regulatory requirements related to the policy area.
o Benchmark against similar organizations or competitors to identify effective approaches and
lessons learned.
o Develop a draft of the policy document, incorporating the defined purpose, scope, and
requirements.
o Organize the content logically, using clear language and formatting for readability.
o Share the draft policy with key stakeholders and subject matter experts for feedback and review.
o Incorporate any suggested revisions or improvements based on feedback received.
o Conduct a legal and compliance review to ensure that the policy complies with relevant laws,
regulations, and industry standards.
o Seek advice from legal counsel or compliance experts to address any legal or regulatory concerns.
Approval Process:
o Submit the finalized policy document for approval by senior management or the appropriate
governing body.
o Obtain signatures or formal endorsement to signify approval and adoption of the policy.
o Communicate the policy to all relevant stakeholders within the organization, including employees,
contractors, and third-party vendors.
o Provide training and awareness programs to educate stakeholders about the policy requirements
and their roles and responsibilities.
Implementation Plan:
o Develop an implementation plan to guide the rollout and enforcement of the policy.
o Define timelines, milestones, and responsible parties for implementing the policy effectively.
o Establish mechanisms for monitoring compliance with the policy and enforcing adherence to its
requirements.
o Implement regular audits, assessments, or reviews to evaluate compliance and identify areas for
improvement.
o Establish procedures for regularly reviewing and updating the policy to reflect changes in business
needs, technology, and regulatory requirements.
o Define roles and responsibilities for managing policy updates and ensuring that stakeholders are
informed of any changes.
Internal Stakeholders:
o Employees: Individuals who work within the organization at various levels and departments.
o Management: Executives, managers, and supervisors responsible for overseeing and directing the
organization's operations and strategies.
o Board of Directors: Individuals elected or appointed to represent shareholders' interests and
provide governance oversight.
o IT Staff: Personnel responsible for managing and maintaining information technology systems and
infrastructure.
o Security Personnel: Individuals tasked with ensuring the security and integrity of the organization's
assets, including physical and digital resources.
External Stakeholders:
o Customers: Individuals or entities who purchase goods or services from the organization.
o Suppliers and Partners: Companies or individuals who provide products, services, or support to the
organization.
o Shareholders and Investors: Individuals or entities who own shares or have invested in the
organization.
o Regulators and Government Agencies: Authorities responsible for enforcing laws, regulations, and
standards relevant to the organization's operations.
o Community and Society: Individuals, groups, or organizations in the broader community who may
be impacted by the organization's activities.
Management:
IT Staff:
Security Personnel:
Employees:
A security audit is a systematic evaluation of an organization's security measures, controls, policies, and
procedures to assess their effectiveness in protecting assets, mitigating risks, and ensuring compliance
with relevant standards, regulations, and best practices. The primary purpose of a security audit is to
identify vulnerabilities, weaknesses, and areas of non-compliance within an organization's security
framework and recommend remedial actions to strengthen security posture.
o Identifying Security Weaknesses: Security audits help identify vulnerabilities, gaps, and
weaknesses in an organization's security infrastructure, systems, and processes. By pinpointing
areas of weakness, organizations can take proactive measures to address them before they are
exploited by malicious actors.
o Mitigating Risks: Security audits assess the level of risk exposure faced by an organization and
provide recommendations for mitigating those risks. By implementing the recommendations from
security audits, organizations can reduce the likelihood and impact of security breaches, data leaks,
and other security incidents.
o Ensuring Compliance: Security audits help organizations ensure compliance with relevant laws,
regulations, standards, and contractual obligations related to information security. By conducting
regular audits, organizations can demonstrate their commitment to compliance and avoid potential
legal and regulatory penalties.
o Improving Security Posture: Security audits provide insights into the effectiveness of an
organization's security controls and practices. By identifying areas for improvement, organizations
can enhance their security posture, strengthen their defense mechanisms, and better protect their
assets and data from cyber threats.
o Building Trust and Confidence: Security audits demonstrate to stakeholders, including customers,
partners, investors, and regulators, that an organization takes security seriously and has robust
measures in place to protect their interests. By building trust and confidence in the organization's
security capabilities, audits can enhance reputation and credibility.
o Detecting Insider Threats: Security audits can help detect insider threats, including unauthorized
access, misuse of privileges, and data breaches by employees or other insiders. By monitoring user
activities and access logs, audits can identify suspicious behavior and potential insider risks.
o Benchmarking Against Best Practices: Security audits enable organizations to benchmark their
security practices against industry best practices, standards, and frameworks. By comparing their
security posture to recognized benchmarks, organizations can identify areas where they are falling
short and adopt proven strategies for improvement.
In summary, security audits are essential for organizations to identify and address security vulnerabilities,
mitigate risks, ensure compliance, improve security posture, build trust with stakeholders, detect insider
threats, and benchmark against best practices. By conducting regular audits, organizations can proactively
manage security risks and protect their assets, data, and reputation from potential harm.
o Emphasize the importance of protecting the organization's assets, data, and reputation from
security threats and vulnerabilities.
o Explain how security audits can help identify weaknesses, mitigate risks, ensure compliance, and
improve overall security posture.
o Highlight the potential consequences of security breaches, including financial loss, reputational
damage, and legal liabilities.
o Acknowledge any concerns or objections stakeholders may have regarding the implementation of
security audits.
o Provide reassurance that security audits are conducted with the organization's best interests in mind
and are essential for safeguarding its interests and stakeholders' interests alike.
o Offer to address specific concerns or questions stakeholders may have about the audit process,
scope, or impact.
o Explain how investing in security audits can yield a positive return on investment by helping
prevent costly security breaches and associated damages.
o Provide examples or case studies of organizations that have benefited from implementing security
audits, such as improved security posture, reduced risk exposure, and enhanced stakeholder trust.
o Provide a detailed overview of the implementation plan for security audits, including the scope,
objectives, methodologies, and timelines.
o Specify the resources, budget, and personnel required to conduct the audits effectively.
o Offer to collaborate with stakeholders in defining audit criteria, selecting audit teams, and
establishing communication channels.
o Highlight any legal, regulatory, or contractual obligations that necessitate the implementation of
security audits.
o Explain how security audits can help ensure compliance with relevant laws, regulations, standards,
and industry best practices.
o Offer assurance that conducting security audits demonstrates the organization's commitment to
compliance and risk management.