Security Policies and Implementation Issues: Week 6 - Chapter 8 IT Security Policy Framework Approaches
Security Policies and Implementation Issues: Week 6 - Chapter 8 IT Security Policy Framework Approaches
Implementation Issues
Week 6 - Chapter 8
IT Security Policy Framework Approaches
Data stewards
Data custodians
Data administrators
Eliminates redundant
controls, policies, and efforts
Proactively enforces
policy
Week 6 – Chapter 9
User Domain Policies
System Security
Employees
admins personnel
Guests and
Contractors Vendors general
public
Control
partners
Similarities
• Private organizations may follow public-
compliance laws depending on their governance
requirements
• Public organizations may be small is size and
thus have similar control over their user
populations
Differences
• Public organizations must follow Sarbanes Oxley
Compliance (SOX), Health Insurance Portability
and Accountability Act (HIPAA), and other
compliance laws
• Private organizations are often smaller and
easier to control from a user standpoint
• Private organizations may not follow public-
compliance laws
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Security Policies and Implementation Issues www.jblearning.com Page 29
All rights reserved.
Acceptable Use Policy (AUP)
Attempts to protect an organization’s
computers and network
Addresses password management
Addresses software licenses
Addresses intellectual property management
Describes e-mail etiquette
Describes the level of privacy an individual
should expect when using an organization’s
computer or network
Describes noncompliance consequences
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Security Policies and Implementation Issues www.jblearning.com Page 30
All rights reserved.
Privileged-Level Access Agreement
(PAA)
Acknowledges the risk associated with
elevated access in the event the credentials
are breached or abused
Asks user to promise to use access only for
approved organization business
Asks user to promise not to attempt to “hack”
or breach security
Asks user to promise to protect any output from
these credentials such as reports, logs, files,
and downloads
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
Security Policies and Implementation Issues www.jblearning.com Page 31
All rights reserved.
Security Awareness Policy (SAP)
Addresses:
• Basic principles of information security
• Awareness of risk and threats
• Dealing with unexpected risk
• Reporting suspicious activity, incidents, and
breaches
• Building a culture that is security and risk
aware
Executive Managers
Auditors
Least privilege—
Patch management—All
Individuals should only Unique identity—All
network devices should
have the access users must use unique
have the latest security
necessary to perform credentials
patches
their responsibilities
Virus protection—Virus
and malware prevention
must be installed on
every desktop and laptop
computer
Least Access
Best Fit Privileges
Privileges