Cs PPT CHP 2 Part 2
Cs PPT CHP 2 Part 2
STANDARDS,PROCEDURES
AND GUIDELINES AND
SOCIAL ENGINEERING
Chapter 2 part 2
SECURITY POLICIES STANDARDS,
PROCEDURES AND GUIDELINES
Policies – High – level broad statements
Standards- Mandatory elements regarding the
implementation of policy
Guidelines- Recommendation relating to
Policies
Procedures- step – by- step instructions on
how to implement policies
POLICY LIFE- CYCLE
Plan(Adjust)- develop the policy, procedures
and guidelines, and design the security
component
Implement- Implementation of Policy with
Instruction Period
Monitor- Ensuring that h/w , s/f and , policy,
procedure and guidelines are effective in
securing you systems.
Evaluate- Evaluating the effectiveness of the
security measures u have in place – includes
vulnerability Assessments, Penetration Test
etc
SECURITY POLICIES
STANDARDS,PROCEDURES AND GUIDELINES
DETAILED EXPLAINATION(IF NEEDED)
KNOW HOW TO SET POLICIES
Part of information security management is determining
how security will be maintained in the organization.
Management defines information security policies to
describe how the organization wants to protect its
information assets.
After policies are outlined, standards are defined to
set the mandatory rules that will be used to implement
the policies.
Some policies can have multiple guidelines, which
are recommendations as to how the policies can be
implemented.
Finally, information security management,
administrators, and engineers create procedures from
the standards and guidelines that follow the policies.
INFORMATION SECURITY POLICIES