SlideShare a Scribd company logo
There are two general types of data dictionaries: a database
management system data dictionary and an organization-wide
data dictionary. For this assignment, we are focusing on the
organization-wide data dictionary. In a data dictionary,
individual data elements and definitions are defined to ensure
consistency and accuracy. Assume you need to collect and
analyze data on patients discharged and readmitted to hospital X
within 90 days of discharge. Develop the data dictionary for
this study by completing the table below. Your data dictionary
must include a minimum of 15 discreet data elements. Include
information you would need to identify:
· the patient (Unique identifier)
· the admission(s)
· the reason for each admission (why the patient presented to
the hospital emergency department)
· the principal diagnosis which is defined as the condition of the
patient made after studying the patient and their admission to
the hospital.
· the indicator for justified readmission or questionable
readmission.
Guided response: Include at least 15 data elements and the
rationale for each data element, using the format below and
include:
· A title page with the following:
· Title of paper
· Student’s name
· Course name and number
· Instructor’s name
· Date submitted
· Include two scholarly references, excluding the textbook,
formatted according to APA style as outlined in the Writing
Center.
CHAPTER
5
Security Policies, Standards, Procedures, and
Guidelines
The four components of security documentation are policies,
standards,
procedures, and guidelines. Together, these form the complete
definition of a
mature security program. The Capability Maturity Model
(CMM), which measures
how robust and repeatable a business process is, is often applied
to security
programs. The CMM relies heavily on documentation for
defining repeatable,
optimized processes. As such, any security program considered
mature by CMM
standards needs to have well-defined policies, procedures,
standards, and
guidelines.
• Policy is a high-level statement of requirements. A security
policy is the primary
way in which management’s expectations for security are
provided to the
builders, installers, maintainers, and users of an organization’s
information
systems.
• Standards specify how to configure devices, how to install
and configure
software, and how to use computer systems and other
organizational assets, to be
compliant with the intentions of the policy.
• Procedures specify the step-by-step instructions to perform
various tasks in
accordance with policies and standards.
• Guidelines are advice about how to achieve the goals of the
security policy, but
they are suggestions, not rules. They are an important
communication tool to let
people know how to follow the policy’s guidance. They convey
best practices for
using technology systems or behaving according to
management’s preferences.
This chapter covers the basics of what you need to know about
policies,
standards, procedures, and guidelines, and provides some
examples to illustrate
the principles. Of these, security policies are the most important
within the
context of a security program, because they form the basis for
the decisions that
are made within the security program, and they give the security
program its
“teeth.” As such, the majority of this chapter is devoted to
security policies. There
are other books that cover policies in as much detail as you like.
See the
References section for some recommendations. The end of this
chapter provides
you with some guidance and examples for standards,
procedures, and guidelines,
so you can see how they are made, and how they relate to
policies.
Security Policies
A security policy is the essential foundation for an effective and
comprehensive
security program. A good security policy should be a high-level,
brief, formalized
statement of the security practices that management expects
employees and
other stakeholders to follow. A security policy should be
concise and easy to
understand so that everyone can follow the guidance set forth in
it.
In its basic form, a security policy is a document that describes
an
organization’s security requirements. A security policy specifies
what should be
done, not how; nor does it specify technologies or specific
solutions. The security
policy defines a specific set of intentions and conditions that
will help protect an
organization’s assets and its ability to conduct business. It is
important to plan an
approach to policy development that is consistent, repeatable,
and
straightforward.
A top-down approach to security policy development provides
the security
practitioner with a roadmap for successful, consistent policy
production. The
policy developer must take the time to understand the
organization’s regulatory
landscape, business objectives, and risk management concerns,
including the
corporation’s general policy statements. As a precursor to
policy development, a
requirements mapping effort may be required in order to
incorporate industry-
specific regulation. Chapter 3 covered several of the various
regulations as well
as best practice frameworks that security policy developers may
need to
incorporate into their policies.
NOTE The regulatory landscape includes U.S. federal and state
laws regarding data
and personal privacy, European laws restricting what
organizations can do with
personal data, laws from other countries that must be followed
when an
organization does business there, and industry-specific
standards. All relevant
regulations must be incorporated into the policy development
objectives.
A security policy lays down specific expectations for
management, technical
staff, and employees. A clear and well-documented security
policy will determine
what action an organization takes when a security violation is
encountered. In
the absence of clear policy, organizations put themselves at risk
and often
flounder in responding to a violation.
• For managers, a security policy identifies the expectations of
senior management
about roles, responsibilities, and actions that should be taken by
management
with regard to security controls.
• For technical staff, a security policy clarifies which security
controls should be
used on the network, in the physical facilities, and on computer
systems.
• For all employees, a security policy describes how they
should conduct
themselves when using the computer systems, e-mail, phones,
and voice mail.
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch3.html
A security policy is effectively a contract between the business
and the users
of its information systems. A common approach to ensuring that
all parties are
aware of the organization’s security policy is to require
employees to sign an
acknowledgement document. Human Resources should keep a
copy of the
security policy documentation on file in a place where every
employee can easily
find it.
Security Policy Development
When developing a security policy for the first time, one useful
approach is to
focus on the why, who, where, and what during the policy
development process:
1. Why should the policy address these particular concerns?
(Purpose)
2. Who should the policy address? (Responsibilities)
3. Where should the policy be applied? (Scope)
4. What should the policy contain? (Content)
For each of these components of security policy development, a
phased
approach is used, as discussed next.
NOTE Executive management’s involvement and approval will
be required. But
initially, the executives may not understand the subject matter.
As the policy
developer works through the policy development process,
gaining executive-level
buy-in, feedback, and approval at each stage is useful in
garnering support for
the security program. This is a good opportunity to correlate
executive
management’s business requirements and concerns, regulatory
requirements,
and standards guidance to security policy components.
Phased Approach
If you approach security policy development in the following
phases, depicted
in Figure 5-1, the work will be more manageable:
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch5.html#fig5_1
Figure 5-1 Security policy development process
1. Requirements gathering
• Regulatory requirements (industry specific)
• Advisory requirements (best practices)
• Informative requirements (organization specific)
2. Project definition and proposal based on requirements
3. Policy development
4. Review and approval
5. Publication and distribution
6. Ongoing maintenance (and revision)
After the security policy is approved, standards and procedures
must be
developed in order to ensure a smooth implementation. This will
require the
policy developer to work closely with the technical staff to
develop standards and
procedures relating to computers, applications, and networks.
Security Policy Contributors
Security policy should not be developed in a vacuum. A good
security policy
forms the core of a comprehensive security awareness program
for employees,
and its development shouldn’t be the sole responsibility of the
IT department.
Every department that has a stake in the security policy should
be involved in its
development, not only because this enables them to tailor the
policy to their
requirements, but also because they will be responsible for
enforcing and
communicating the policies related to each of their specialties.
Different groups
and individuals should participate and be represented in order to
ensure that
everyone is on board, that all are willing to comply, and that the
best interests of
the entire organization are represented. Figure 5-2 shows some
example
contributors to the security policy.
Figure 5-2 Example of security policy contributors
When creating a security policy, the following groups may be
represented:
• Human Resources The enforcement of the security policy,
when it involves
employee rewards and punishments, is usually the responsibility
of the HR
department. HR implements discipline up to and including
termination when the
organization’s policies are violated. HR also obtains a signature
from each
employee certifying that they have read and understood the
policies of the
organization, so there is no question of responsibility when
employees don’t
comply with the policy.
• Legal Often, an organization that has an internal legal
department or outside
legal representation will want to have those attorneys review
and clarify legal
points in the document and advise on particular points of
appropriateness and
applicability, both in the organization’s home country and
overseas. All
organizations are advised to have some form of legal review and
advice on their
policies when those policies are applied to individual
employees.
• Information Technology Security policy tends to focus on
computer systems,
and specifically on the security controls that are built into the
computing
infrastructure. IT employees are generally the largest consumers
of the policy
information.
• Physical Security Physical Security (or Facilities)
departments usually
implement the physical security controls specified in the
security policy. In some
cases, the IT department may manage the information systems
components of
physical security.
Security Policy Audience
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch5.html#fig5_2
The intended audience for the security policies is all the
individuals who handle
the organization’s information, such as:
• Employees
• Contractors and temporary workers
• Consultants, system integrators, and service providers
• Business partners and third-party vendors
• Employees of subsidiaries and affiliates
• Customers who use the organization’s information resources
Figure 5-3 shows a representation of some example security
policy audience
members.
Figure 5-3 Security policy audience
Technology-related security policies generally apply to
information resources,
including software, web browsers, e-mail, computer systems,
workstations, PCs,
servers, mobile devices, entities connected on the network,
software, data,
telephones, voice mail, fax machines, and any other information
resources that
could be considered valuable to the business.
Organizations may also need to implement security policy
contractually with
business partners and vendors. They may also need to release a
security policy
statement to customers.
Policy Categories
Security policies can be subdivided into three primary
categories:
• Regulatory For audit and compliance purposes, it is useful to
include this specific
category. The policy is generally populated with a series of
legal statements
detailing what is required and why it is required. The results of
a regulatory
requirements assessment can be incorporated into this type of
policy.
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch5.html#fig5_3
• Advisory This policy type advises all affected parties of
business-specific policy
and may include policies related to computer systems and
networks, personnel,
and physical security. This type of policy is generally based on
security best
practices.
• Informative This type of policy exists as a catch-all to ensure
that policies not
covered under Regulatory and Advisory are accounted for.
These policies may
apply to specific business units, business partners, vendors, and
customers who
use the organization’s information systems.
The security policy should be concise and easy to read, in order
to be effective.
An incomprehensible or overly complex policy risks being
ignored by its
audience and left to gather dust on a shelf, failing to influence
current
operational efforts. It should be a series of simple, direct
statements of senior
management’s intentions.
The form and organization of security policies can be reflected
in an outline
format with the following components:
• Author The policy writer
• Sponsor The Executive champion
• Authorizer The Executive signer with ultimate authority
• Effective date When the policy is effective; generally when
authorized
• Review date Subject to agreement by all parties; annually at
least
• Purpose Why the policy exists; regulatory, advisory, or
informative
• Scope Who the policy affects and where the policy is applied
• Policy What the policy is about
• Exceptions Who or what is not covered by the policy
• Enforcement How the policy will be enforced, and
consequences for not
following it
• Definitions Terms the reader may need to know
• References Links to other related policies and corporate
documents
Frameworks
The topics included in a security policy vary from organization
to organization
according to regulatory and business requirements. We refer to
these topics
together as a framework.
Organizations may prefer to take a control objective–based
approach to
creating a security policy framework. For instance, government
agencies may
take a FISMA-based approach. The Federal Information
Security Management Act
of 2002 imposes a mandatory set of processes that must follow a
combination of
Federal Information Processing Standards (FIPS) documents,
the NIST Special
Publications 800 series, and other legislation pertinent to
federal information
systems.
Policy Categories
NIST Special Publication 800-53, Recommended Security
Controls for Federal
Information Systems and Organizations, control objectives are
organized into 18
major categories (see NIST in Chapter 3).
Control objective subsets exist for each major control category
and equal at
least 170 control objectives. NIST SP 800-53 is a good starting
point for any
organization interested in making sure that all the basic control
objectives are
met regardless of the industry and whether it is regulated.
Additional Regulations and Frameworks
An organization that must comply with HIPAA (described in
Chapter 3) may map
NIST SP 800-53 control objectives to the HIPAA Security Rule.
HIPAA categorizes
security controls (referred to as safeguards) into three major
categories:
Administrative, Physical, and Technical. As an example, CFR
Part 164.312 section
(c)(1), which requires protection against improper alteration or
destruction of
data, is a HIPAA required control that maps to NIST 800-53
System and
Information Integrity controls.
Some organizations may wish to select a framework based on
COBIT (Control
Objectives for Information and related Technology). COBIT is
an IT governance
framework and supporting toolset that allows managers to
bridge the gap
between control requirements, technical issues, and business
risks. Developing
policy from a COBIT framework may take considerable
collaboration with the
Finance and Audit departments. Other organizations may need
to combine COBIT
with ITIL (IT Infrastructure Library) to ensure that service
management
objectives are met. ITIL is a cohesive best-practices framework
drawn from the
public and private sectors internationally. It describes the
organization of IT
resources to deliver business value, and documents processes,
functions, and
roles in IT service management.
Still other organizations may wish to follow the OCTAVE
(Operationally
Critical Threat, Asset, and Vulnerability Evaluation)
framework. OCTAVE is a risk-
based strategic assessment and planning technique for security
from CERT
(Carnegie Mellon University). And yet others may need to
incorporate the ISO
Family (27001 and 27002) from the International Standards
Organization. ISO is a
framework of standards that provides best practices for
information security
management.
Depending on which regulated industry an organization finds
itself in, it is
important to take the time to select an appropriate framework
and to map out the
regulatory and business requirements in the first phase of
development.
Security Awareness
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch3.html
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch3.html
The first line of attack against any organizatio n’s assets is often
the trusted
internal personnel, the employees that have been granted access
to the internal
resources. As with most things, the human element is the least
predictable and
easiest to exploit. Trusted employees are either corrupted or
tricked into
unintentionally providing valuable information that aids
intruders. Because of
the high level of trust placed in employees, they are the weakest
link in any
security chain. Attackers will often “mine” information from
employees either by
phone, by computer, or in person by gaining information that
seems innocuous
by itself but provides a more complete picture when pieced
together with other
fragments of information. Organizations that have a strong
network security
infrastructure may find their security weakened if the
employees are convinced
to reduce security levels or reveal sensitive information.
One of the most effective strategies to combat this exposure of
information by
employees is education. When employees understand that they
shouldn’t give out
private information, and know the reasons why, and know that
they will be held
accountable, they are less likely to inadvertently aid an attacker
in harvesting
information. A good security awareness program should include
communications
and periodic reminders to employees about what they should
and should not
divulge to outside parties. Training and education help mitigate
the threats of
social engineering and information leakage. Figure 5-4 depicts
some examples of
security awareness techniques that can inform different
personality types and
provide educational opportunities.
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch5.html#fig5_4
Figure 5-4 Ideas to incorporate into a security awareness
program
Importance of Security Awareness
An ongoing security awareness program should be implemented
for all
employees. Security awareness programs vary in scope and
content. See the
“References” section of this chapter for pointers to good
resources for starting
and maintaining a security awareness program. In this section,
we will explore
some of the basics of how to raise security awareness among
employees in
organizations.
Employees often intentionally or accidentally undermine even
the most
carefully engineered security infrastructure. That is because
they are allowed
trusted access to information resources through firewalls, access
control devices,
buildings, phone systems, and other private resources in order
to do their jobs.
End users have the system accounts and passwords needed to
copy, alter, delete,
and print confidential information, change the integrity level of
the information,
or prevent the information from being available to an authorized
user. Propping
doors open, giving out their account and password information,
and throwing
away sensitive papers are common practices in most
organizations, and it’s these
practices that put the information security program at risk. It’s
also these
practices that a security awareness program seeks to modify and
prevent.
In addition to practicing habits that weaken security, employees
are also
usually the first to notice security incidents. Employees that are
well educated in
security principles and procedures can quickly control the
damage caused by a
security breach. A staff that is aware of security concerns can
prevent incidents
and mitigate damage when incidents do occur. Employees are a
useful
component of a comprehensive security strategy.
Objectives of an Awareness Program
The practice of raising the awareness of each individual in the
organization is
similar to commercial advertising of products. The message
must be understood
and accepted by each and every person, because every employee
is crucial to the
success of the security program. One weak link can bring down
the entire system.
It’s imperative that these objectives be measurable. In a security
awareness
campaign, the security message is the sales pitch, the product to
be sold is the
idea of security, and the market is every employee in the
organization.
Communicating the message is the primary goal, and the
information absorbed
by the employees is the catalyst for behavioral change.
Employees usually know
much of what an awareness program conveys. The awareness
program reminds
them so that secure behaviors are automatic.
A plan for an effective security awareness program should
include
• A statement of measurable goals for the awareness program
• Identification and categorization of the audience
• Specification of the information to be included in the program
• Description of how the employees will benefit from the
program
Some of this information can be provided by security
management (e.g., goals,
types of information) and some can be provided by the audience
themselves (e.g.,
demographics, benefits). Surveys and in-person interviews can
be utilized to
collect some of this information. Identification of specific
problems in the
organization can provide additional insight. This information is
needed to
determine how the awareness program will be developed and
what form its
communication may take.
The objectives of a security awareness program really need to
be clarified in
advance, because presentation is the key to success. A well -
organized, clearly
defined presentation to the employees will generate more
support and less
resistance than a poorly developed, random, ineffective attempt
at
communication. Compliance with this training is often a
requirement. Of
paramount importance is the need to avoid losing the audience’s
interest or
attention or alienating the audience by making them feel like
culprits or
otherwise inadequate to the task of protecting security. The
awareness program
should be positive, reassuring, and interesting.
Just as with any educational program, if the audience is given
too much
information to absorb all at once, they may become
overwhelmed and may lose
interest in the awareness program. This would result in a failure
of the
awareness program, since its goal is to motivate all employees
to participate. An
awareness program should be a long-term, gradual process. An
effective
awareness program reinforces desired behaviors and gradually
changes
undesired behaviors.
An awareness program may fail for any of the following
reasons:
• It is not changed frequently
• It does not test whether the learner is understanding the
material
• It does not test how a user behaves under a given scenario,
such as whether the
user calls the help desk to report a suspicious event
• It does not incentivize the user to participate
• It does not include performance evaluations and additional
tracking
Participation should be consistent and comprehensive, attended
and applied
by all employees, including contractors and business partners
who have access to
information systems. New employees should also be folded into
the current
program. Refresher courses should be given periodically
throughout the business
year, so attention to the program does not wander, the
information stays fresh in
the employees’ memories, and changes can be communicated.
Management should allow sufficient time for employees to
arrange their work
schedules so that they can participate in awareness activities.
Typically, the
security policy requires that employees sign a document stating
that they
understand the material presented and will comply with security
policies.
Responsibility for conducting awareness program activities
needs to be clearly
defined, and those who are responsible must demonstrate that
they are
performing to expectations. The organization’s training
department and security
staff may collaborate on the program, or an outside organization
or consultant
may be hired to perform program activities.
Increasing Effectiveness
Security awareness programs are meant to change behaviors,
habits, and
attitudes. To be successful in this, an awareness program must
appeal to positive
preferences. For example, a person who believes that it is
acceptable to share
confidential information with a colleague or give their password
out to a new
employee must be shown that people are respected and
recognized in the
organization for protecting confidential data rather than for
sharing it.
The overall message of the program should emphasize factors
that appeal to
the audience. For example, the damage to a person done when
their identity or
personal information is stolen may result in a lowering of their
credit score or
increase in their insurance rates. An awareness program can
focus on the victims
and the harmful results of incautious activities. People need to
be made aware
that bad security practices hurt people, whether they intend to
or not. The
negative effects can be spotlighted to provide motivation, but
the primary value
of scare tactics is to get the user community to start thinking
about security (and
their decisions and behaviors) in a way that helps them see how
they can protect
themselves from danger.
Actions that cause inconvenience or require a sacrifice from the
audience may
not be adopted if the focus is on the difficulty of the actions
themselves, rather
than the positive effects of the actions. The right message will
have a positive
spin, encouraging the employees to perform actions that make
them heroes, such
as the courage and independence it takes to resist appeals from
friends and
coworkers to share copyrighted software. Withstanding peer
pressure to make
unethical or risky choices can be shown in a positive light.
Specific topics that are contained in most awareness programs
include
• Privacy of personal, customer, and the organization’s
information (including
payroll, medical, and personnel records)
• The scope of inherent software and hardware vulnerabilities
and how the
organization manages this risk
• Hostile software or malicious code (for example, viruses,
worms, Trojans, back
doors, and spyware) and how it can damage the network and
compromise the
privacy of individuals, customers, and the organization
• The impact of distributed attacks and distributed denial of
service attacks and
how to defend against them
• The principle of shared risk in networked systems (the risk
assumed by one
employee is imposed on the entire network)
Walt Disney World’s Security Awareness Program: A Case
Study
At the Computer Security Institute’s (CSI’s) NetSec conference
in June 2003, Anne
Kuhns of Walt Disney World’s IT division demonstrated some
of the best features
of Disney’s security awareness program at the time. The
program included a self-
study module incorporating animated visual activities, clever,
eye-catching
graphics with friendly characters, and a combination of friendly
encouragement
and stern correction, all in fun.
The module stopped at various checkpoints to ask the employee
questions
about what they just saw. For example, after describing
password policy, it
showed four passwords and asked which one complied with the
policy. Choosing
an incorrect answer earned the employee a stern “No” from the
narrator along
with an explanation of why the answer was incorrect. A correct
answer was
required to proceed.
Another section included an interactive activity, to maintain
attention. A
cartoon desk and computer were shown along with some other
items. The items
were clickable, and the module asked the employee to identify
things on the desk
that were violations of security policy—such as a mobile device
left unattended, a
stack of confidential documents in the trash, and a workstation
left logged in
while nobody is there. Upon clicking these items, the employee
was treated to a
positive narration along with a description of why those
behaviors are
undesirable. The consequences were also mentioned, including
the personal risk
to the employee, which was an effective attention-getter.
There was also a game-like objective to the training. At the
completion of each
section, the employee earned a “key.” After collecting four
keys, the employee
earned a big fanfare and an electronic certificate. Continued
employment
depended on the successful completion of the training, but the
employee also
gained a sense of satisfaction and accomplishment from
“winning the game.”
Implementing the Awareness Program
Once employees understand how to recognize a security
problem, they can begin
thinking about how they can perform their job functions in
compliance with the
security policy, and how they should react to security events
and incidents.
Typical topics for complying with security policy and incident
response include
• How to report potential security events, including who should
be notified and
what to do during and after an incident, the timeframe for such
reporting, and
what to do about unauthorized or suspicious activity. Some
situations may
require use of verbal communication instead of e-mail, such as
when another
employee (especially a system administrator) is acting
suspicious, when a
computer system is under attack, or when e-mail may be
intercepted by the
intruder.
• How to use information technology systems in a secure
manner.
• How to create and manage passwords, how to safely conduct
file transfers and
downloads, and how to handle e-mail attachments.
The awareness program should emphasize that security is a top
priority of
management. Security practices should be shown to be the
responsibility of
everyone in the organization, from executive management down
to each
employee. Employees will take security practices more
seriously when they see
that it is important to the organizatio n rather than just another
initiative like any
other, and when executives lead by example. Codes of ethics or
behavior
principles can be used to let all employees know exactly what to
do and what is
expected of them.
Employees should also be clear about whom to contact and what
to report
regarding security incidents. Information should be provided to
the employees so
that they know whom to contact during an incident. Contact
information, such as
telephone and pager numbers, e-mail addresses, and web
addresses for security
staff, the incident response team, and the help desk should be
included.
Employees should be made aware that time is critical in security
compromise
situations. They should be informed that immediate reporting of
incidents could
contain damage, control the extent of the problem, and prevent
further damage.
Enforcement
Enforcement is arguably the most important component of
network security.
Policies, procedures, and security technologies don’t work if
they are ignored or
misused. Enforcing the security policy ensures compliance with
the principles
and practices intended by the architects of the security
infrastructure. Security
policy enforcement includes a security operations component,
which is discussed
in more detail in Chapter 31. However, penalties for not
following the policy are
typically performed by Human Resources, not Security. Security
reports
violations, and HR enforces.
Enforcement takes many forms. For general employees,
enforcement provides
the assurance that daily work activities comply with the security
policy. For
system administrators and other privileged staff, enforcement
guarantees proper
maintenance actions and prevents abuse of the higher level of
trust given to this
category of personnel. For managers, enforcement prevents
overriding of the
security practices intended by the framers of the security policy,
and it reduces
the incidence of conflicts of interest produced when managers
give their
employees orders that violate policy. For everyone, enforcement
dissuades
people from casually, intentionally, or accidentally breaking the
rules.
Negative enforcement usually takes the form of threats to the
employee—
threats of negative comments on an employee’s review, of a
manager’s
displeasure, or of termination, for example. For some
violations, a progression of
corrective actions may be required, eventually culminating in
loss of the
employee’s job after many repeated violations. For other, more
serious breaches
of trust, termination may be the first step. Regardless of the
severity of the
correction, employees should clearly understand what is
required of them, and
what the process is for punishment when they don’t comply with
the rules. In all
cases, employees should sign a document indicating their
understanding of this
process.
Positive enforcement is just as important as negative
enforcement, if not more
so. This may take the form of rewards to employees who follow
the rules. These
employees are important—they are the ones who keep the
business running
smoothly within the parameters of the corporate policy. They
should be retained
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch31.html
and kept motivated to do the right thing. Rewards can range
from verbal
congratulations to financial incentives and awards for good
behavior.
Policy Enforcement for Vendors
Security enforcement for business partners and other non-
corporate entities is
the responsibility of the organization’s Board of Directors,
which manages
relationships with other corporations, makes deals, and signs
contracts and
statements of intent. These documents should all include
security expectations
and include signatures of responsible executives. If you want to
be able to
enforce a particular level of service (defined in the service -level
agreement), then
you need to define it first. When security policy is violated by
partner
organizations, the Board of Directors should hold those
organizations responsible
and take appropriate business measures to correct the problem.
This may include
financial penalties for underperformance or incentives for
overperformance.
Policy Enforcement for Employees
Enforcement of the corporate security policy for employees and
temporary
workers is usually the direct responsibility of Human
Resources. HR implements
punitive actions up to and including termination for serious
violations of security
policy, and it also attempts to correct behavior with warnings
and evaluations.
Positive reinforcement can also be enacted by HR, in the form
of financial
bonuses and other incentives.
All employees, without exception, should be held to the same
standards of
policy enforcement. It is very important not to discriminate or
differentiate
between employees when enforcing policy. This is especially
true of
management. Managers, especially senior managers and
corporate executives,
should be just as accountable as regular employees—perhaps
even more so.
Senior management should set an example of right behavior for
the rest of the
organization, and perhaps should be held even to a higher
standard than those
employees who work for them. When management violates trust
or policy, how
can employees be expected to adhere to their expectations? By
paving the way
with high standards of conduct, management helps encourage
compliance with
the standards of behavior they have set for the employees.
Software-Based Enforcement
Software can sometimes be used to enforce policy compliance,
preventing actions
that are not allowed by the policy. One example of this is web
browsing controls
such as web site blockers. These programs maintain a list of
prohibited web sites
that is consulted each time an end user attempts to visit a web
site. If the attempt
is made to go to one of the prohibited sites, the attempt is
blocked.
Software-based enforcement has the advantage that employees
are physically
unable to break the rules. Others include Group Policy settings
for the operating
system. This means that nobody will be able to violate the
policy, regardless of
how hard they try. Thus, the organization is assured 100 percent
policy
compliance. Software enforcement is the easiest and most
reliable method of
ensuring compliance with security policy.
There are some disadvantages to software enforcement as well.
One
disadvantage is that employees who are grossly negligent or
willful policy
violators (bad seeds) will not be discovered. Some organizations
want to weed out
these people from their staff, so their employees will consist of
mostly honest,
hard-working people. With software-based enforcement, it is
harder to discover
the time wasters, who may find other, less apparent ways of
being inefficient.
Another disadvantage of automated enforcement is that it may
cause
disgruntlement and unhappiness among employees who feel that
the
organization is constraining them, making them conform to a
code of behavior
with which they do not agree. These employees may feel that
“big brother is
watching them” and may feel uncomfortable with confining
controls. Depending
on the corporate culture, this may be a more or less serious
problem.
Automated enforcement of policy by software can also be
circumvented by
trusted administrative personnel who have special access to
disable, bypass, or
modify the security configuration to give themselves special
permissions not
granted to regular employees. This breach of trust may be
difficult to prevent or
detect. This is a more general problem that applies to
administrative personnel
who are responsible for security devices and controls. The best
solution is to
implement separation of duties, so that violation of trust
requires more than one
person—two or more trusted employees would have to collude
to get around the
system. Finally, security policies must be in balance with
functional
requirements.
Regardless of the corporate culture, and how software-based
enforcement is
used in the organization to control behavior and encourage
compliance with the
corporate security policy and acceptable use policy, those
policies should be well
documented and clearly communicated to employees, with
signatures by the
employees indicating that they understand and agree to the
terms. Additionally,
software-based enforcement, when used, should be only one
step in the chain of
enforcement techniques that includes other levels, up to and
including
termination. Organizations should not rely solely on software
for this purpose;
they should have clearly defined levels of deterrence that
employees understand.
In most organizations, employment is an at-will contract
between the employer
and the employee, and employees should understand that they
can lose their job
if they try to behave in ways that violate the ethics or principles
of the employer.
Don’t use software as an excuse or a means of avoiding the
difficulties and
hardships of enforcement; instead, use it as a tool to accomplish
the
organization’s enforcement goals.
Every industry has different audit requirements and data
retention policies
based on which standards they adhere to. Some industries are
required to have
external, independent auditors, while other industries may be
fine with internal,
in-house audits. Do your due diligence and practice due care by
finding out which
laws and regulations you are required to be in compliance with.
Example Security Policy Topics
This section includes sample security policy topics to provide
insight into the
subjects that might be included in a general security policy for a
typical
organization. These examples are meant to inspire you to
consider which topics
might apply to your particular situation and to provide a starting
point for
thinking about other subjects that might be relevant. Many
policy writers are
focused on particular subjects, like passwords or network
segmentation, and this
can make it difficult to think about other topics that should be
covered. Referring
to this list may help policy writers broaden their focus.
This particular set of policy statements is oriented toward a
typical small to
midsize organization attempting to protect its data resources.
Use this as a
starting point for elements of your security policy, or compare
it with your
existing security policy to see whether yours needs additional
scope.
NOTE The security policy can be divided into sections relating
to any reasonable
groupings of subjects, such as computers, networks, data, and so
on.
The following policy examples are organized in conceptual
categories,
according to their general focus. These categories include
acceptable use,
computer, network, data privacy, data integrity, personnel
management, security
management, and physical security policies. These can serve
either as topic ideas
or as starting points for more comprehensive policy statements.
A full policy
would contain the information in the following examples along
with a statement
of purpose (indicating why each policy is required), a scope
definition (indicating
to whom each policy applies), a stateme nt of monitoring and
auditing (indicating
how compliance will be measured and assessed), and a
statement about
enforcement (indicating what can happen if the policy is
violated).
NOTE The following policy examples are intended to serve as a
starting point for
your organization. Your requirements will vary. Ideally, the
following policy
examples will provide you with ideas about topics for your own
policy.
Acceptable Use Policies
Employees may find it helpful to understand exactly how the
organization
expects them to use computing resources. Every organization
has expectations
for employee use of computers, but these must be communicated
in advance to
be effectively enforced.
The following is a sample of an acceptable use policy. Notice
that the policy is
composed of clear, easy-to-read instructions that everyone can
understand.
1. PURPOSE
1.1. The organization’s information resources exist in order to
support business
purposes. Inadvertent or intentional misuse can damage the
organization’s
business, its customers, vendors, partners, shareholders, and
employees. This
policy is intended to minimize that damage.
2. SCOPE
2.1. This policy is applicable to all information resources
including software, web
browsers, email, computer systems, workstations, PCs, servers,
mobile devices,
entities connected on the network, software, data, telephones,
voice mail, fax
machines, and any information resources that could be
considered valuable to
the business, in all locations.
3. RESPONSIBILITIES
3.1. All employees, contractors, consultants, service providers,
and temporary
workers are responsible for following these practices.
4. ACCEPTABLE USE OF INFORMATION RESOURCES
What to do:
• Protect the organization’s intellectual property and keep it
confidential
• Report any unauthorized or inappropriate use, or any security
concerns
• Follow the guidance in the Information Classification,
Labeling, and Handling
policy
What not to do:
• Do not forward, provide access, store, distribute, and/or
process confidential
information to unauthorized people or places, or post
confidential information
on Internet bulletin boards, chat rooms, or other electronic
forums
• Do not access information resources, records, files,
information, or any other data
when there is no proper, authorized, job-related need
• Do not provide false or misleading information to obtain
access to information
resources
• Do not use any account and/or password that has not been
assigned to you
• Do not perform any conduct which may harm the
organization’s reputation
• Do not view offensive websites, send or forward offensive
email
• Do not place personal files on the organization’s computing
servers
• Do not connect any equipment not owned and managed by the
organization to
the organization’s network
• Do not install personally owned software or non-licensed
software on the
organization’s computers
Personal Use of Information Systems Personal use of the
organization’s
computer systems is allowed on a limited basis to employees
provided that it does
not interfere with the organization’s business, expose the
organization to liability
or damage, compromise the organization’s intellectual property,
or violate any
laws.
Employees should be advised that the organization may at any
time be
required by law to print or copy files, e-mail, hard copy, or
backups and provide
this information to government or law enforcement agencies.
Internet Usage Monitoring All connections to the Internet must
be monitored
for the following activities:
• Attempts to access restricted web sites
• Transfers of very large files
• Excessive web browsing
• Unauthorized hosting of web servers by employees
• Transfers of the organization’s data to or from the Internet
Personal Web Sites Employees may not run personal web sites
on the
organization’s equipment.
Ethical Use of the Internet Personal Internet use must conform
to the corporate
standard of ethics.
Non-Corporate Usage Agreement Outside organizations must
sign a usage
agreement before connecting to the corporate data resources.
Employee Usage Agreement All employees must sign a usage
agreement.
Personal Use of Telephones Corporate phone systems may be
used for limited,
local, personal calls, as long as this usage does not interfere
with the performance
of the corporate business.
Personal Use of Long-Distance Corporate phone systems may be
used for
personal domestic long-distance calls, providing that the
expense for these calls
does not exceed reasonable limits.
Computer Policies
This group of policies applies to computers and information
systems.
Authentication policies often form the largest collection of
policy statements in a
computer environment because authentication systems and
variations are so
complex and because they tend to have the greatest impact on
the average
computer user. Password policies are often the largest subset of
authentication
policies.
Account/Password Authentication A unique account and
password
combination must authenticate all users of information systems.
The account
name must be used only by a single individual, and the
password must be a
secret known only to that individual.
New Account Requests The manager responsible for a new end
user must
request access to corporate information systems via a new
account. End users
may not request their own accounts. The new account request
must be recorded
and logged for the record. When the account is no longer
needed, the account
must be disabled.
Account Changes The manager responsible for the end user
must request
changes in access privileges for corporate information systems
for a system
account. End users may not request access-privilege changes to
their own
accounts. The request must be recorded and logged for the
record.
Two-Factor Authentication All administrators of critical
information servers
must be authenticated via a token card and PIN code. The
individual must be
uniquely identified based on possession of the token card and
knowledge of a
secret PIN code known only to the individual user.
Desktop Command Access Access to operating system
components and system
administration commands on end-user workstations or desktop
systems is
restricted to system support staff only. End users will be
granted access only to
commands required to perform their job functions.
Generic User Accounts Generic system accounts for use by
people are
prohibited. Each system account must be traceable to a single
specific individual
who is responsible and accountable for its use. Passwords may
not be shared
with any other person.
Inactive Screen Lock Computer systems that are left unattended
must be
configured to lock the screen with a password-protected
screensaver after a
period of inactivity. This screen locking must be configured on
each computer
system to ensure that unattended computer systems do not
become a potential
means to gain unauthorized access to the network.
Login Message All computer systems that connect to the
network must display a
message before connecting the user to the network. The intent
of the login
message is to remind users that information stored on the
organization’s
information systems belongs to the organization and should not
be considered
private or personal. The message must also direct users to the
corporate
information system usage policy for more detailed information.
The message
must state that by logging on, the user agrees to abide by the
terms of the usage
policy. Continuing to use the system indicates the user’s
agreement to adhere to
the policy.
Failed Login Account Disabling After ten successive failed
login attempts, a
system account must be automatically disabled to reduce the
risk of
unauthorized access. Any legitimate user whose account has
been disabled in this
manner may have it reactivated by providing both proof of
identity and
management approval for reactivation.
Password Construction Account names must not be used in
passwords in any
form. Dictionary words and proper names must not be used in
passwords in any
form. Numbers that are common or unique to the user must not
be used in
passwords in any form. Passwords shorter than eight characters
are not allowed.
Password Expiration Passwords may only be used for a
maximum of 3 months.
Upon the expiration of this period, the system must require the
user to change
their password. The system authentication software must
enforce this policy.
Password Privacy Passwords that are written down must be
concealed in a way
that hides the fact that the written text is a password. When
written, the
passwords should appear as part of a meaningless or
unimportant phrase or
message, or be encoded in a phrase or message that means
something to the
password owner but to nobody else. Passwords sent via e-mail
must use the same
concealment and encoding as passwords that are written down,
and in addition
must be encrypted using strong encryption.
Password Reset In the event that a new password must be
selected to replace an
old one outside of the normally scheduled password change
period, such as when
a user has forgotten their password or when an account has been
disabled and is
being reactivated, the new password may only be created by the
end user, to
protect the privacy of the password.
Password Reuse When the user changes a password, the last six
previously used
passwords may not be reused. The system authentication
software must enforce
this policy.
Employee Account Lifetime Permanent employee system
accounts will remain
valid for a period of 12 months, unless otherwise requested by
the employee’s
manager. The maximum limit on the requested lifetime of the
account is 24
months. After the lifetime of the account has expired, it can be
reactivated for the
same length of time upon presentation of both proof of identity
and management
approval for reactivation.
Contractor Account Lifetime Contractor system accounts will
remain valid for a
period of 12 months, unless otherwise requested by the
contractor’s manager.
The maximum limit on the requested lifetime of the account is
24 months. After
the lifetime of the account has expired, it can be reactivated for
the same length
of time upon presentation of both proof of identity and
management approval for
reactivation.
Business Partner Account Lifetime Business partner system
accounts will
remain valid for a period of 3 months, unless otherwise
requested by the
manager responsible for the business relationship with the
business partner. The
maximum limit on the requested lifetime of the account is 12
months. After the
lifetime of the account has expired, it can be reactivated for the
same length of
time upon presentation of both proof of identity and
management approval for
reactivation.
Same Passwords On separate computer systems, the same
password may be
used. Any password that is used on more than one system must
adhere to the
policy on password construction.
Generic Application Accounts Generic system accounts for use
by applications,
databases, or operating systems are allowed when there is a
business
requirement for software to authenticate with other software.
Extra precautions
must be taken to protect the password for any generic account.
Whenever any
person no longer needs to know the password, it must be
changed immediately. If
the software is no longer in use, the account must be disabled.
Inactive Accounts System accounts that have not been used for
a period of 90
days will be automatically disabled to reduce the risk of unused
accounts being
exploited by unauthorized parties. Any legitimate user whose
account has been
disabled in this manner may have it reactivated by providing
both proof of
identity and management approval for reactivation.
Unattended Session Logoff Login sessions that are left
unattended must be
automatically logged off after a period of inactivity. This
automatic logoff must be
configured on each server system to ensure that idle sessions do
not become a
potential means to gain unauthorized access to the network.
User-Constructed Passwords Only the individual owner of each
account may
create passwords, to help ensure the privacy of each password.
No support staff
member, colleague, or computer program may generate
passwords.
User Separation Each individual user must be blocked by the
system
architecture from accessing other users’ data. This separation
must be enforced
by all systems that store or access electronic information. Each
user must have a
well-defined set of information that can be located in a private
area of the data
storage system.
Multiple Simultaneous Logins More than one login session at a
time on any
server is prohibited, with the exception of support staff. User
accounts must be
set up to automatically disallow multiple login sessions by
default for all users.
When exceptions are made for support staff, the accounts must
be manually
modified to allow multiple sessions.
Network Policies
This next group of policies applies to the network infrastructure
to which
computer systems are attached and over which data travels.
Policies relating to
network traffic between computers can be the most variable of
all, because an
organization’s network is the most unique component of its
computing
infrastructure, and because organizations use their networks in
different ways.
These example policies may or may not apply to your particular
network, but
they may provide inspiration for policy topics you can consider.
Extranet Connection Access Control All extranet connections
(connections to
and from other organizations’ networks outside of the
organization, either
originating from the external organization’s remote network
into the internal
network, or originating from the internal network going out to
the external
organization’s remote network) must limit external access to
only those services
authorized for the remote organization. This access control must
be enforced by
IP address and TCP/UDP port filtering on the network
equipment used to
establish the connection.
System Communication Ports Systems communicating with
other systems on
the local network must be restricted only to authorized
communication ports.
Communication ports for services not in use by operational
software must be
blocked by firewalls or router filters.
Inbound Internet Communication Ports Systems communicating
from the
Internet to internal systems must be restricted to use only
authorized
communication ports. Firewall filters must block
communication ports for
services not in use by operational system software. The default
must be to block
all ports, and to make exceptions to allow specific ports
required by system
software.
Outbound Internet Communication Ports Systems
communicating with the
Internet must be restricted to use only authorized
communication ports. Firewall
filters must block communication ports for services not in use
by operational
system software. The default must be to block all ports, and to
make exceptions to
allow specific ports required by system software.
Unauthorized Internet Access Blocking All users must be
automatically blocked
from accessing Internet sites identified as inappropriate for the
organization’s
use. This access restriction must be enforced by automated
software that is
updated frequently.
Extranet Connection Network Segmentation All extranet
connections must be
limited to separate network segments not directly connected to
the corporate
network.
Virtual Private Network All remote access to the corporate
network is to be
provided by virtual private network (VPN). Dial-up access into
the corporate
network is not allowed.
Virtual Private Network Authentication All virtual private
network
connections into the corporate network require token-based or
biometric
authentication.
Home System Connections Employee and contractor home
systems may connect
to the corporate network via a virtual private network only if
they have been
installed with a corporate-approved, standard operating system
configuration
with appropriate security patches as well as corporate-approved
personal
firewall software or a network firewall device.
Data Privacy Policies
The topic of data privacy is often controversial and can have
significant legal
ramifications. Consult a legal adviser before implementing this
type of policy. The
legal definition of data ownership can be complex depending on
how an
organization’s computer systems are used and what expectations
have been
communicated to employees.
Copyright Notice All information owned by the organization
and considered
intellectual property, whether written, printed, or stored as data,
must be labeled
with a copyright notice.
E-Mail Monitoring All e-mail must be monitored for the
following activity:
• Non-business use
• Inflammatory, unethical, or illegal content
• Disclosure of the organization’s confidential information
• Large file attachments or message sizes
Information Classification Information must be classified
according to its
intended audience and be handled accordingly. Every piece of
information must
be classified into one of the following categories:
• Personal Information not owned by the organization,
belonging to private
individuals
• Public Information intended for distribution to and viewing
by the general
public
• Confidential Information for use by employees, contractors,
and business
partners only
• Proprietary Intellectual property of the organization to be
handled only by
authorized parties
• Secret Information for use only by designated individuals
with a need to know
Intellectual Property All information owned by the organization
is considered
intellectual property. As such, it must not be disclosed to
unauthorized
individuals. The organization’s intellectual property must be
protected and kept
confidential. Forwarding intellectual property to unauthorized
users, providing
access to intellectual property to unauthorized users,
distributing intellectual
property to unauthorized users, storing intellectual property in
unauthorized
locations, and processing unauthorized intellectual property is
prohibited. Any
unauthorized or inappropriate use must be reported
immediately.
Clear Text Passwords Passwords may not be sent in clear text
over the Internet
or any public or private network either by individuals or by
software, nor may
they be spoken over public voice networks without the use of
encryption.
Clear Text E-mail E-mail may be sent in clear text over the
Internet, as long as it
does not contain secret, proprietary, or confidential corporate
information. E-
mail containing sensitive or non-public information must be
encrypted.
Customer Information Sharing Corporate customer information
may not be
shared with outside organizations or individuals.
Employee Information Sharing No employee information may
be disclosed to
outside agencies or individuals, with the following exceptions:
• Date of hire
• Length of tenure
Employee Communication Monitoring The organization reserves
the right to
monitor employee communications.
Examination of Data on the Organization’s Systems The
organization reserves
the right to examine all data on its computer systems.
Search of Personal Property The organization reserves the right
to examine the
personal property of its employees and visitors brought onto the
organization’s
premises.
Confidentiality of Non-Corporate Information All customer and
business
partner information is to be treated as confidential.
Encryption of Data Backups All data backups must be
encrypted.
Encryption of Extranet Connection All extranet connections
must use
encryption to protect the privacy of the information traversing
the network.
Shredding of Private Documents Sensitive, confidential,
proprietary, and secret
paper documents must be shredded when discarded.
Destruction of Computer Data Sensitive, confidential,
proprietary, and secret
computer data must be strongly overwritten when deleted.
Cell Phone Privacy Private business information may not be
discussed via cell
phone, due to the risk and ease of eavesdropping.
Confidential Information Monitoring All electronic data
entering or leaving the
internal network must be monitored for the following:
• Confidential information sent via e-mail or file transfer
• Confidential information posted to web sites or chat rooms
• Disclosure of source code or other intellectual property
Unauthorized Data-Access Blocking Each individual user must
be blocked by
the system architecture from accessing unauthorized corporate
data. This
separation must be enforced by all systems that store or access
electronic
information. Corporate information that has been classified as
being accessible to
a subset of users, but not to all users, must be stored and
accessed in such a way
that accidental or intentional access by unauthorized parties is
not possible.
Data Access Access to corporate information, hard copy, and
electronic data is
restricted to individuals with a need to know for a legitimate
business reason.
Each individual is granted access only to those corporate
information resources
required for them to perform their job functions.
Server Access Access to operating system components and
system
administration commands on corporate server systems is
restricted to system
support staff only. End users will be granted access only to
commands required
for them to perform their job functions.
Highly Protected Networks In networks that have unique
security requirements
that are more stringent than those for the rest of the corporate
network and
contain information that is not intended for general
consumption by employees
and is meant only for a small number of authorized individuals
in the
organization (such as salary and stock information or credit card
information),
the data on these networks must be secured from the rest of the
network.
Encryption must be used to ensure the privacy of
communications between the
protected network and other networks, and access control must
be employed to
block unauthorized or accidental attempts to access the
protected network from
the corporate network.
Data Integrity Policies
Data integrity policies focus on keeping valuable information
intact. It is
important to start with definitions of how data integrity may be
compromised,
such as by viruses, lack of change control, and backup failure.
Workstation Antivirus Software All workstations and servers
require antivirus
software.
Virus-Signature Updating Virus signatures must be updated
immediately when
they are made available from the vendor.
Central Virus-Signature Management All virus signatures must
be updated
(pushed) centrally.
E-Mail Virus Blocking All known e-mail virus payloads and
executable
attachments must be removed automatically at the mail server.
E-Mail Subject Blocking Known e-mail subjects related to
viruses must be
screened at the mail server, and messages with these subjects
must be blocked at
the mail server.
Virus Communications Virus warnings, news, and instructions
must be sent
periodically to all users to raise end-user awareness of current
virus information
and falsehoods.
Virus Detection, Monitoring, and Blocking All critical servers
and end-user
systems must be periodically scanned for viruses. The virus
scan must identify
the following:
• E-mail-based viruses arriving on servers and end-user systems
• Web-based viruses arriving on servers and end-user systems
• E-mail attachments containing suspected virus payloads
Notification must be provided to system administration staff
and the intended
recipient when a virus is detected.
All critical servers and end-user systems must be constantly
monitored at all
times for virus activity. This monitoring must consist of at least
the following
categories:
• E-mail-based viruses passing through mail servers
• Web-based viruses passing through web servers
• Viruses successfully installed or executed on individual
systems
Notification must be provided to system administration staff
and the intended
recipient when a virus is detected.
Viruses passing through web proxy servers and e-mail gateways
must be
blocked in the following manner:
• E-mail-based viruses passing through mail servers must have
the attachment
removed
• Web-based viruses passing through web servers must have the
attachment
removed
• Messages with subject lines known to be associated with
viruses must not be
passed through mail servers, and must instead be discarded
Notification must be provided to system administration staff
and the intended
recipient when a message or web page containing a suspected
virus is blocked.
Back-out Plan A back-out plan is required for all production
changes.
Software Testing All software must be tested in a suitable test
environment
before installation on production systems.
Division of Environments The division of environments into
Development, Test,
Staging, and Production is required for critical systems.
Version Zero Software Version zero software (1.0, 2.0, and so
on) must be
avoided whenever possible to avoid undiscovered bugs.
Backup Testing Backups must be periodically tested to ensure
their viability.
Online Backups For critical servers with unique data, online
(disk) backups are
required, along with offline (tape) backups.
Onsite Backup Storage Backups are to be stored onsite for one
month before
being sent to an offsite facility.
Fireproof Backup Storage Onsite storage of backups must be
fireproof.
Offsite Backup Storage Backups older than one month must be
sent offsite for
permanent storage.
Quarter-End and Year-End Backups Quarter-end and year-end
backups must be
done separately from the normal schedule, for accounting
purposes.
Change Control Board A corporate Change Control Board must
be established
for the purpose of approving all production changes before they
take place.
Minor Changes Support staff may make minor changes without
review if there is
no risk of service outage.
Major Changes The Change Control Board must approve major
changes to
production systems in advance, because they may carry a risk of
service outage.
Vendor-Supplied Application Patches Vendor-supplied patches
for applications
must be tested and installed immediately when they are made
available.
Vendor-Supplied Operating System Patches Vendor-supplied
patches for
operating systems must be tested and installed immediately
when they are made
available.
Vendor-Supplied Database Patches Vendor-supplied patches for
databases must
be tested and installed immediately when they are made
available.
Disaster Recovery A comprehensive disaster-recovery plan must
be used to
ensure continuity of the corporate business in the event of an
outage.
System Redundancy All critical systems must be redundant and
have automatic
failover capability.
Network Redundancy All critical networks must be redundant
and have
automatic failover capability.
Personnel Management Policies
Personnel management policies describe how people are
expected to behave. For
each intended audience (management, system administrators,
general
employees, and so on), the policy addresses specific behaviors
that are expected
by management with respect to computer technologies and how
they are used.
NOTE Some policies relate to computers and others relate to
people. It can be helpful
to separate the two types into different sections, because they
may have different
audiences. This section includes policies related to people.
Many of these policies apply to system administrators, who
have elevated
levels of privilege that provide fuller access to data and systems
than regular
employees have. This presents unique challenges and
requirements for
maintaining the privacy, integrity, and availability of systems to
which
administrators may have full, unrestricted access.
CAUTION Many organizations overlook the special
requirements of system
administrators in their security policies. Doing so can leave a
large vulnerability
unchecked, because system administrators have extensive
privileges that can
produce catastrophic consequences if they are misused or if
accidents happen.
Application Monitoring All servers containing applications
designated for
monitoring must be constantly monitored during the hours the
application
operates. At least the following activities must be monitored:
• Application up/down status
• Resource usage
• Nonstandard behavior of application
• Addition or change of the version, or application of software
patches
• Any other relevant application information
Desktop System Administration No user of a workstation or
desktop system
may be the system administrator for their own system. The root
or Administrator
password may not be made available to the user.
Intrusion-Detection Monitoring All critical servers must be
constantly
monitored at all times for intrusion detection. This monitoring
must cover at least
the following categories:
• Port scans and attempts to discover active services
• Nonstandard application connections
• Nonstandard application behavior
• Multiple applications
• Sequential activation of multiple applications
• Multiple failed system login attempts
• Any other relevant intrusion-detection information
Firewall Monitoring All firewalls must be constantly monitored,
24×7×365, by
trained security analysts. This monitoring must include at least
the following
activities:
• Penetration detection (on the firewall)
• Attack detection (through the firewall)
• Denial of service detection
• Virus detection
• Attack prediction
• Intrusion response
Network Security Monitoring All internal and external networks
must be
constantly monitored, 24×7×365, by trained security analysts.
This monitoring
must detect at least the following activities:
• Unauthorized access attempts on firewalls, systems, and
network devices
• Port scanning
• System intrusion originating from a protected system behind a
firewall
• System intrusion originating from outside the firewall
• Network intrusion
• Unauthorized modem dial-in usage
• Unauthorized modem dial-out usage
• Denial of services
• Correlation between events on the internal network and the
Internet
• Any other relevant security events
System Administrator Authorization System administration staff
may examine
user files, data, and e-mail when required to troubleshoot or
solve problems. No
private data may be disclosed to any other parties, and if any
private passwords
are thus identified, this must be disclosed to the account owner
so they can be
changed immediately.
System Administrator Account Monitoring All system
administration accounts
on critical servers must be constantly monitored at all times. At
least the
following categories of activities must be monitored:
• System administrator account login and logout
• Duration of login session
• Commands executed during login session
• Multiple simultaneous login sessions
• Multiple sequential login sessions
• Any other relevant account information
System Administrator Authentication Two-factor token or
biometric
authentication is required for all system administrator account
access to critical
servers.
System Administrator Account Login System administration
staff must use
accounts that are traceable to a single individual. Access to
privileged system
commands must be provided as follows:
• On Unix systems Initial login must be from a standard user
account, and root
access must be gained via the su command.
• On Windows systems System administration must be done
from a standard user
account that has been set up with Administrator privileges.
Direct login to the root or Administrator account is prohibited.
System Administrator Disk-Space Usage Monitoring System
administration
staff may examine user files, data, and e-mail when required to
identify disk-
space usage for the purposes of disk usage control and storage
capacity
enhancement and planning.
System Administrator Appropriate Use Monitoring System
administration
staff may examine user files, data, and e-mail when required to
investigate
appropriate use.
Remote Virus-Signature Management All virus software must be
set up to
support secure remote virus-signature updates, either
automatically or manually,
to expedite the process of signature file updating and to ensure
that the latest
signature files are installed on all systems.
Remote Server Security Management All critical servers must
be set up to
support secure remote management from a location different
from where the
server resides. Log files and other monitored data must be sent
to a secure
remote system that has been hardened against attack, to reduce
the probability of
log file tampering.
Remote Network Security Monitoring All network devices must
be set up to
support security management from a location different from
where the network
equipment resides. Log files and other monitored data must be
sent to a secure
remote system that has been hardened against attack, to reduce
the probability of
log file tampering.
Remote Firewall Management All firewalls must be set up to
support secure
remote management from a location different from where the
firewall resides.
Log files and other monitored data must be sent to a secure
remote system that
has been hardened against attack, to reduce the probability of
log file tampering.
Security Management Policies
Managers have responsibilities for security just as employees
do. Detailing
expectations for managers is crucial to ensure compliance with
senior
management’s expectations.
Employee Nondisclosure Agreements All employees must sign a
nondisclosure
agreement that specifies the types of information they are
prohibited from
revealing outside the organization. The agreement must be
signed before the
employee is allowed to handle any private information
belonging to the
organization. Employees must be made aware of the
consequences of violating
the agreement, and signing the agreement must be a condition of
employment,
such that the organization may not employ anyone who fails to
sign the
agreement.
Nondisclosure Agreements All business partners wishing to do
business with
the organization must sign a nondisclosure agreement that
specifies the types of
information they are prohibited from revealing outside the
organization. The
agreement must be signed before the business partner is allowed
to view, copy,
or handle any private information belonging to the organization.
System Activity Monitoring All internal information system
servers must be
constantly monitored, 24×7×365, by trained security analysts.
At least the
following activities must be monitored:
• Unauthorized access attempts
• Root or Administrator account usage
• Nonstandard behavior of services
• Addition of modems and peripherals to systems
• Any other relevant security events
Software Installation Monitoring All software installed on all
servers and end-
user systems must be inventoried periodically. The inventory
must contain the
following information:
• The name of each software package installed on each system
• The software version
• The licensing status
System Vulnerability Scanning All servers and end-user systems
must be
periodically scanned for known vulnerabilities. The
vulnerability scan must
identify the following:
• Services and applications running on the system that could be
exploited to
compromise security
• File permissions that could grant unauthorized access to files
• Weak passwords that could be easily guessed by people or
software
Security Document Lifecycle All security documents, including
the corporate
security policy, must be regularly updated and changed as
necessary to keep up
with changes in the infrastructure and in the industry.
Security Audits Periodic security audits must be performed to
compare existing
practices against the security policy.
Penetration Testing Penetration testing must be performed on a
regular basis to
test the effectiveness of information system security.
Security Drills Regular “fire drills” (simulated security
breaches, without
advance warning) must take place to test the effectiveness of
security measures.
Extranet Connection Approval All extranet connections require
management
approval before implementation.
Non-Employee Access to Corporate Information Non-employees
(such as
spouses) are not allowed to access the organization’s
information resources.
New Employee Access Approval Manager approval is required
for new
employee access requests.
Employee Access Change Approval Manager approval is
required for employee
access change requests.
Contractor Access Approval Manager approval is required for
contractor access
requests.
Employee Responsibilities The following categories of
responsibilities are
defined for corporate employees. These categories consist of
groupings of
responsibilities that require differing levels of access to
computer systems and
networks. They are used to limit access to computers and
networks based on job
requirements, to implement the principles of least privilege and
separation of
duties.
• General User
• Operator
• System Administrator
• Customer Support Staff
• Customer Engineer
• Management
Security Personnel Responsibilities The following categories of
responsibilities
are defined for security personnel. These categories consist of
groupings of
responsibilities within the security organization that require
differing levels of
access to security information and systems based on job
function, in order to
implement the principles of least privilege and separation of
duties.
• Security Architect
• Facility Security Officer
• Security Manager
• Technical Security Administrator
Employee Responsibility for Security All corporate employees
are responsible
for the security of the computer systems they use and the
physical environment
around them.
Sensitive HR Information Sensitive HR information (such as
salaries and
employee records) must be separated and protected from the rest
of the
corporate network.
Security Policy Enforcement Enforcement of this corporate
security policy is the
responsibility of the corporate Human Resources department.
HR New Hire Reporting HR must report required information
about new hires
to system administrators one week in advance of the new
employee’s start date.
HR Termination Reporting HR must report required information
about
terminations to system administrators one week before the
termination date, if
possible, and no later than the day of termination.
Contractor Information Reporting HR is responsible for
managing contractor
information and providing this information to system
administrators.
Background Checks HR must perform background checks on
new employee
applicants.
Reference Checks HR must perform reference checks on new
employee
applicants.
Physical Security Policies
In the context of computer systems, physical security policies
describe how
computer hardware and direct access is managed. Because the
computer systems
reside in a building, and that building may be used for other
purposes as well,
there may be some overlap and potential conflicts of interest
with the other
purposes of the building. These must be addressed and resolved
in order to
properly protect the computers and the people who use them.
CAUTION Physical security is often the responsibility of a
department other than
Information Technologies (often Facilities, for example).
However, many of the
requirements for physical network security overlap with the
general
requirements for corporate physical security. An effective
physical network
security policy is developed in tandem with the organization
responsible for
general physical security.
Building and Campus Security
Building and campus security policies describe what people are
expected to do on
the organization’s property. These are physical security
policies, and they often
fall outside the domain of information technology.
Room Access Based on Job Function Room access must be
restricted based on
employee job function.
Physical Security for Laptops All laptops must be locked to a
sturdy fixture
using a cable when not in transit.
Position of Computer Monitors Computer monitors must be
faced away from
windows to discourage “eavesdropping.”
Badges on the Organization’s Premises All corporate employees
on the
production premises must display badges with picture
identification in plain
view.
Temporary Badges Temporary badges may be provided to
employees who have
lost or forgotten their badges.
Guards for Private Areas Guards or receptionists must be
located in areas
containing sensitive information.
Badge Checking Guards or receptionists must ask to see badges
for all people
attempting to access the building.
Tailgating Tailgating or piggybacking (following a person into
a building) is
prohibited, and allowing any person to tailgate or piggyback is
prohibited.
Employee Responsibility for Security Employees are
responsible for the
security of the servers at all facilities, and for the actions of
their coworkers.
Security Policy Enforcement Enforcement of this physical
security policy is the
responsibility of HR.
Data Center Security
Data center policies describe how computer equipment and data
is protected in
the physical facilities in which the computer and network
equipment resides.
This protection is very important, because unauthorized
physical access can be
the most direct route to compromising a computer system.
Physical Security for Critical Systems All critical equipment
must be kept in
locked rooms.
Security Zones Within the production equipment area of the
production facility,
equipment is separated into two physical spaces with differing
access
requirements:
• Standard General production servers with standard sensitivity
• Highly secure Production servers with higher security
requirements
Non-Employee Access to Corporate Systems Non-employees
(such as
contractors) are not allowed physical access to the
organization’s information
resources.
Asset Tags All equipment in the production facility must carry
an asset tag
bearing a unique identifier.
Equipment Entrance Pass All equipment entering the production
facility must
be recorded in a log that contains at least the following
information:
• Employee name
• Date and time
• Type of equipment
• Asset tag
• Corporate employee signature
• Production employee signature
Equipment Exit Pass All equipment leaving the production
facility must be
recorded in a log that contains at least the following
information:
• Employee name
• Date and time
• Type of equipment
• Asset tag
• Corporate employee signature
• Production employee signature
Access Authorization Employees must be authorized in advance
by a corporate
manager of director-level or higher status before attempting to
gain access to the
production equipment facility. In general, this authorization
must come from the
Director of Operations or their designated backup.
Access from Inside Employees already inside the production
equipment area
may not open the door to allow access to anyone else from
outside the area. This
access must be provided through the production staff escort.
Employee Access Lifetime Access accounts for all employees
will remain valid
for a period of 12 months, unless otherwise requested by the
employee’s
manager. The maximum limit on the requested lifetime of the
account is 24
months. After the lifetime of the account has expired, it can be
reactivated for the
same length of time upon presentation of both proof of identity
and management
approval for reactivation.
Inactive Access Badges Access accounts that have not been
used for a period of
90 days will be automatically disabled, to reduce the risk of
unused accounts
being exploited by unauthorized parties. Any legitimate user
whose account has
been disabled in this manner may have it reactivated by
providing both proof of
identity and management approval for reactivation.
New Access Requests The manager responsible for a new
employee or an
employee who has not previously had access must request
access to the
production facility for that employee. Employees may not
request their own
accounts. The new access request must be recorded and logged
for the record.
When the access is no longer needed, the account must be
disabled.
Production Staff Access Production staff may only enter the
secure area when
explicitly requested by a corporate employee, and only after
confirming the
request with the designated corporate director-level contact.
Access Monitoring All access to the production facility must be
constantly
monitored during all hours of the day, 24×7×365. This
monitoring must consist of
at least the following:
• Camera recording of the production area
• Video screen monitoring by production staff
• Video tape recording
Access via Secure Area Access to the highly secure area is
provided via the
secure area. Thus, all security requirements pertaining to the
secure area are
prerequisites for access to the highly secure area.
Buddy System A minimum of two employees is required for
access to the highly
secure production equipment facility. Unaccompanied access to
the highly secure
production facility is prohibited.
Three-Badge Access Requirement Access to the highly secure
equipment room
from the outside requires both a corporate employee and a
production facility
employee. Once access is granted, the corporate employees may
remain in the
production room without production employee escort.
Biometric Authentication All employees requiring access to the
highly secure
facility must be authenticated via a biometric device that
uniquely identifies the
individual based on some personal biological characteristic.
Production Staff Access Production staff may not enter the
highly secure area
under any circumstances.
Room Access Based on Job Function Room access to the secure
and the highly
secure areas must be restricted based on employee job function.
Health and Safety
The health and safety of people is of paramount importance.
There is no higher
priority for any organization. All other policies are secondary
and must not
infringe on the safety of individuals during a crisis or during
normal operations.
Policies designed to protect the lives of people vary widely—a
few are listed here
as examples, but these are unique to each situation.
Search of Personal Property The production facility must
examine any bags or
personal carrying items larger than a purse or handbag.
Tailgating Tailgating or piggybacking (following a person into
a building) is
prohibited, and allowing any person to tailgate or piggyback is
prohibited.
Security Drills Regular security drills (simulated security
breaches without
advance warning) must take place to test the effectiveness of
security measures.
These drills can take the form of unauthorized access attempts,
equipment
entrance or removal, or any other appropriate test of production
facility security
measures.
Security Standards
A standard is somewhat more detailed than a policy. Standards
describe how to
comply with the policy, and because they are associated with
policies, they
should be considered mandatory. Standards are the extension of
the policy into
the real world—they specify technology settings, platforms, or
behaviors. Security
managers responsible for IT infrastructure will usually spend
more time writing
standards than they spend on policy.
Much of the information contained in Chapter 21 and 22 of this
book pertains
to settings for Unix and Windows systems. Those settings would
typically be the
level of detail that is included in standards. Compare the
information in those
chapters against the set of policy statements listed in the
previous section of this
chapter. You’ll see that policy statements are simple, direct, and
somewhat
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch21.html
https://learning.oreilly.com/library/view/information-security-
the/9780071784351/ch22.html
general. Standards interpret the policy to the level of specifics
needed by a
subject matter expert.
Security Standard Example
The following is a sample of a security standard. This is part of
a standard for
securing Linux servers. It is intended to establish a baseline set
of configurations
that would establish common settings across all Linux platforms
on the network.
Notice that the level of detail is very deep—only an experienced
system
administrator would be able to understand some of these
instructions. That is
typical of a standard, as opposed to a policy, which everyone
should be able to
understand regardless of their level of expertise.
1. PURPOSE
1.1. The purpose of this standard is to define the software and
hardware
configurations required to secure Linux servers. It defines
security settings for
operating system and software that are required by policy.
2. SCOPE
2.1. This standard is to be used by system administrators
responsible for
administration of computers using the Red Hat Enterprise Linux
operating
system.
3. RESPONSIBILITIES
3.1. The Security Manager is responsible for defining this
standard.
3.2. The Server team is responsible for following this standard.
4. STANDARD
4.1. SERVICES
4.1.1. Specific services that are required for general operation
of the systems and
resident vendor applications services are to be reviewed for
security risks and
approved by the Security Manager.
4.1.2. Services that are not needed are to be disabled during
boot.
4.2. INITIAL PASSWORD AND LOGIN SETTINGS
4.2.1. All accounts for system administrators are to be added as
local accounts in
the /etc/passwd and /etc/shadow files. NIS is not to be used for
password
verification.
4.2.2. Privileged user accounts require IT system operations and
applications
manager approval before being placed on system.
4.2.3. No developer accounts are allowed on production servers.
4.2.4. All administration user accounts are to be set with 90 day
password aging, 7
day notification of password expiration, and 7 day passw ord
minimum.
4.2.5. All root and application administrator accounts are to be
reviewed and will
have a scheduled password change by operations administrators
once every 90
days.
4.2.6. The default login setting is to be set to lock out the
session after 3 failed
password login attempts.
4.2.7. Default password settings must enforce a minimum of 8
characters.
4.2.8. The ability to log in directly over the network to the root
account must be
disabled.
4.3. SENDMAIL
4.3.1. The sendmail service is to be disabled on all non-mail
servers unless
required by an application running on the system. Applications
requiring
Sendmail services must first be approved by IT system
operations manager.
4.4. BANNER/NOTICE
4.4.1. Configure the login banner with the standard warning
notice.
4.5. LOGGING
4.5.1. Turn on logging for Internet standard services.
4.5.2. Turn on logging for LOG_AUTHPRIV facility.
4.5.3. Log connection tracing to inetd/xinetd and messages sent
to AUTH facility.
4.5.4. Set logging for sudo activities.
4.5.5. Send all kernel authorization, debug, and daemon notices
to a syslog server
for monitoring, reviewing, and archiving.
Security Procedures
Procedures are step-by-step instructions to perform a specific
task.
Security Procedure Example
In this example, notice that the level of detail is more specific
than that found in
both policies and standards. The procedure is a set of
instructions that a system
administrator would perform when sitting at the keyboard of the
computer being
built. Most people will not understand this information—it is
very specialized,
and intended only for someone who is a system administrator.
The type of
specialized information found in a security procedure is usually
very job-specific.
1. PURPOSE
1.1. This procedure is intended for the security installation of
Apache web
servers. It defines the steps necessary to ensure a secure
installation that
complies with security policy.
2. SCOPE
2.1. This procedure is to be used by system administrator s
responsible for
installing the Apache HTTP server.
3. RESPONSIBILITIES
3.1. The Security Manager is responsible for defining this
procedure.
3.2. Any system administrator installing Apache HTTP server
on the network is
responsible for following this procedure.
4. APACHE WEB SERVER SECURITY PROCEDURE
4.1. Compile and install the server software as follows:
4.1.1. ./configure --prefix=/usr/local/apache --disable-
module=all --server-
uid=apache --server-gid=apache --enable-module=access --
enable-
module=log_config --enable-module=dir --enable-module=mime
--enable-
module=auth
4.1.2. make
4.1.3. su
4.1.4. umask 022
4.1.5. make install
4.1.6. chown -R root:sys /usr/local/apache
4.2. The next step is to limit Apache processes’ access to the
filesystems. Start this
process by creating a new root directory structure under the
/chroot/httpd
directory:
4.2.1. mkdir -p /chroot/httpd/dev
4.2.2. mkdir -p /chroot/httpd/etc
4.2.3. mkdir -p /chroot/httpd/var/run
4.2.4. mkdir -p /chroot/httpd/usr/lib
4.2.5. mkdir -p /chroot/httpd/usr/libexec
4.2.6. mkdir -p /chroot/httpd/usr/local/apache/bin
4.2.7. mkdir -p /chroot/httpd/usr/local/apache/logs
4.2.8. mkdir -p /chroot/httpd/usr/local/apache/conf
4.2.9. mkdir -p /chroot/httpd/www
4.3. Next, create the special device file: /dev/null:
4.3.1. ls -al /dev/null
4.3.2. crw-rw-rw- 1 root wheel 2, 2 Mar 14 12:53 /dev/null
4.3.3. mknod /chroot/httpd/dev/null c 2 2
4.3.4. chown root:sys /chroot/httpd/dev/null
4.3.5. chmod 666 /chroot/httpd/dev/null
4.4. Add the following line to the /etc/rc.conf file:
4.4.1. syslogd_flags=“-l /chroot/httpd/dev/log”
4.5. Restart the system.
4.6. Copy the main httpd program into the new directory tree
with all necessary
binaries and libraries, as follows:
4.6.1. localhost# ldd /usr/local/apache/bin/httpd
4.7. Copy the files to the new root directory structure:
4.7.1. cp /usr/local/apache/bin/httpd
/chroot/httpd/usr/local/apache/bin/
4.7.2. cp /var/run/ld-elf.so.hints /chroot/httpd/var/run/
4.7.3. cp /usr/lib/libcrypt.so.2 /chroot/httpd/usr/lib/
4.7.4. cp /usr/lib/libc.so.4 /chroot/httpd/usr/lib/
4.7.5. cp /usr/libexec/ld-elf.so.1 /chroot/httpd/usr/libexec/
Security Guidelines
Guidelines give advice. They are not mandatory—they are just
suggestions on
how to follow the policy. Guidelines are meant to make life
easier for the end
user, as well as for the security manager who wrote the policy,
because they help
people understand how to meet the goals set by the security
policy.
Security Guideline Example
In this example, the password complexity rules of the password
policy are
translated into a set of easy-to-follow suggestions. There may
be other ways to
select a password to be compliant with the policy, but these
guidelines are
intended to simplify the process for the end users while at the
same time allowing
them to make strong passwords. Notice that unlike standards
and procedures, the
material is easy for everyone to read and understand.
1. PURPOSE
1.1. These guidelines are meant to give you some ideas about
how to create a
good password. Our password policy requires a certain amount
of complexity,
which can result in difficult-to-remember passwords, but these
guidelines should
help you comply with our password policy while at the same
time making it
easier for you to choose a memorable password.
2. SCOPE
2.1. These guidelines are for all people who have computer
accounts on our
network.
3. RESPONSIBILITIES
3.1. The Security Manager is responsible for defining,
maintaining, and
publishing these guidelines.
4. PASSWORD SELECTION GUIDELINES
4.1. Do:
4.1.1. Use as many different characters as possible including
numbers,
punctuation characters, and mixed upper- and lowercase letters.
Choosing
characters from the largest possible range will make your
password more secure.
4.1.2. Use both upper- and lowercase letters.
4.1.3. Use at least one number and one punctuation mark.
4.1.4. Select passwords that are easy to remember, so they do
not have to be
written down.
4.2. Don’t use any of the following easily guessed items in your
password:
4.2.1. Your name, the names of any family or friends, names of
fictional
characters
4.2.2. Phone number, license or social security numbers
4.2.3. Any date
4.2.4. Any word in the dictionary
4.2.5. Passwords of all the same letter or any variation on the
word “password”
4.2.6. Simple patterns on the keyboard, like qwerty
4.2.7. Any word spelled backwards
4.3. Suggestions:
4.3.1. Use the first one or two letters of each word in a phrase ,
song, or poem you
can easily remember. Add a punctuation mark and a number.
4.3.2. Or, use intentionally misspelled words with a number or
punctuation mark
in the middle.
4.3.3. You can also alternate between one consonant and one or
two vowels, and
include a number and a punctuation mark. This provides a
pronounceable
nonsense word that you can remember.
4.3.4. Or you can choose two short words and concatenate them
together with a
punctuation character between them,
4.3.5. Or, interlace two words or a word and a number (like a
year) by alternating
characters.
Ongoing Maintenance
The security policies, standards, procedures, and guidelines are
living documents.
That means they are not written once and left unchanged for
years. These
documents should be regularly updated in response to changing
business
conditions, technologies, customer requirements, and so on.
Some form of
document version control technology may be helpful in
managing this lifecycle
process.
In order to communicate the security documents, it is best to
keep them online
or in a place where the various audiences will be able to review
and understand
changes as they are approved and implemented. Some
organizations use an
intranet web site to present their security docume nts, so
employees can easily
reference them throughout the workday.
Once the security policies, standards, procedures, and
guidelines are in place,
well established, and in a position to dictate daily operations, an
audit may be
performed by outside agencies or internal departments. An audit
compares
existing practices to the intentions of the policy. Having an
unbiased third-party
perspective can be helpful in isolating weaknesses or problems
with the policy
and its enforcement—this requires a disinterested party (not the
security
organization or the IT department) to perform the audit. Audits
can be performed
as often as needed—monthly, quarterly, yearly, or at some other
interval.
Security policy compliance should be audited at least once a
year, because longer
periods may allow for substantial deviation between the policy
and the
operations.
Summary
This chapter is about how to develop security policies and their
associated
standards, procedures, and guidelines to help people comply. A
security policy
forms the foundation for a productive security program. It is a
statement about
how to protect an organization. It describes an organization’s
security controls,
without specifying technologies, providing guidance to the
people building,
installing, and maintaining computer systems so that they don’t
have to make
decisions by themselves that may conflict with the intentions of
the
organization’s senior management. Security policies should tell
their audience
what must be done, not how these things should be done. A
security policy
specifies what should be done, not how; nor does it specify
technologies or
specific solutions.
A security policy should be in written form. It provides
instructions to
employees about what kinds of behavior or resource usage are
required and
acceptable, and about what is forbidden and unacceptable. A
good security policy
forms the core of a comprehensive security effort, and it is
rarely just the
responsibility of Information Technology departments. Every
department that
has a stake in the security policy should be involved in its
development.
The approach to security policy development provided in this
chapter directs
the reader to understand the regulatory and business
requirements first, select
an appropriate framework or approach, and follow a phased
approach to
security policy development.
References
Barman, Scott. Writing Information Security Policies. New
Riders Publishing, 2001.
Desman, Mark B. Building an Information Security Awareness
Program. Auerbach
Publishing, 2001.
Dijker, Barbara L., ed. A Guide to Developing Computer Policy
Documents. Usenix
Associates, 1996.
Greene, Sari. Security Policies and Procedures: Principles and
Practices. Prentice
Hall, 2005.
Herold, Rebecca. Managing an Information Security and Privacy
Awareness and
Training Program. 2nd ed. CRC Press, 2010.
National Institute of Standards and Technology. NIST Special
Publication 800-50:
Building an Information Technology Security Awareness and
Training Program.
NIST, 2003. http://csrc.nist.gov/publications/nistpubs/800-
50/NIST-SP800-50.pdf
http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800-
50.pdf
National Institute of Standards and Technology. NIST Special
Publication 800-53:
Security and Privacy Controls for Federal Information Systems
and Organizations.
NIST, 2012.
http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-53-
Rev.%204
Peltier, Thomas R. Information Security Policies and
Procedures: A Practitioner’s
Reference. Auerbach Publications, 2004.
Peltier, Thomas R. Information Security Policies, Procedures,
and Standards:
Guidelines for Effective Information Security Management.
Auerbach Publications,
2001.
Wood, Charles C. Information Security Policies Made Easy.
Version 10. Baseline
Software, 2008.
http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-53-
Rev.%204
CHAPTER
6 Security Policies, Standards, Procedures, and Guidelines
Information security is no longer simply about patch
management and firewalls. It requires a holistic risk
management approach. As organizations increasingly rely on
global networks for supply chain and
communications, and amass distributed data in terabyte
amounts, it has become apparent that the old
models for computer security are no longer effective. The
exploitation points have correspondingly
increased exponentially. The old model of hiring a couple of
security analysts or engineers and throwing
them into the Information Technology department is no longer
sufficient to address the growing needs
of data and communications protection. Security can no longer
be left in the hands of the technologists.
It must be acknowledged, considered, embraced, and
championed at the highest levels of the
organization. In other words, it must be aligned to the business
objectives of the organization to
maintain or improve its value.
What is now required is a risk management approach to security
that addresses the organization as a
whole. Risk management cannot be conducted in a silo. It
requires a coordinated and collaborative
approach throughout the organization and must be lifecycle
oriented. It is not enough to form a
“security department” by putting somebody in charge, hiring a
few security technologists, and calling it
a day. Security risk management must now evolve into a highly
defined, quantifiable, justifiable
approach to securing the organization’s assets and reputation
against loss. That “ultimate responsibility”
lands on the shoulders of top executives.
So why the change? Now that the Information Age has
permeated all aspects of the business world, the
business environment and the information that drives it have
become increasingly dynamic. The
information landscape changes daily, and organizations need to
adapt to that change to protect their
assets—in other words, manage their risk.
Roles and Responsibilities
At the executive level, there must be overall and/or ultimate
responsibility (or accountability, if you
prefer) for risk management. The size of the risk management
organization headed by that executive
will vary based on the size of the business. Large organizations
may have all the roles that are defined in
this chapter, whereas smaller organizations may employ a
security organization that consists of a few
individuals (who may also share other responsibilities, as long
as those responsibilities don’t conflict
with their security roles). Midsize organizations need several
security positions ranging from the
technical security administrators who configure firewalls,
routers, antivirus software, and the like, to
security engineers who design security controls, managed by a
security manager, director, or senior
executive. Large organizations need a complete security
organization. All organizations, large or small,
need an executive decision maker who has been designated as
being responsible for security risk.
In addition, the distinctions between large and small
organizations and what security positions they
require vary according to what the organization does. Financial
companies typically require a larger and
more robust security organization due to the capital financial
risk involved in an event or incident that
negatively impacts their integrity, confidentiality, and
availability. Healthcare organizations, along with
businesses in other highly regulated sectors such as publicly
traded companies that must comply with
Sarbanes-Oxley rules, and financial companies that are
regulated by the Gramm-Leach-Bliley Act, also
require a substantial security organization. Technology
companies may require a midsize or smaller
security organization, depending on how exposed they are to
threats, vulnerabilities, and risks from an
attack and how much their security posture is improved by
aligning security to business objectives.
Every organization is different.
Oracle’s Chief Security Officer: A Case Study
As Oracle’s Chief Security Officer (CSO), Mary Ann Davidson
has responsibility for product security as
well as security policies, the security of infrastructure, security
evaluations and assessments, and
incident handling. Oracle was one of the first companies to
establish a CSO position, along with a Chief
Privacy Officer (CPO). While their offices operate
independently, these senior executives coordinate
their efforts on security and privacy issues.
Davidson maintains that software manufacturers should design
and build their applications securely. To
do this, she proposes the following:
• Develop a core group of security experts to inject security
into application design
• Centralize common security functions to work together
• Develop secure coding practices to avoid common
vulnerabilities
• Conduct regression testing to ensure that new versions of
software don’t invalidate previous security
controls
• Submit to independent product assessments and security
evaluations such as the Common Criteria
testing program sponsored by the National Institute of
Standards (NIST) and the National Security
Agency (NSA)
The ability to influence corporate culture at this level
demonstrates the effectiveness and value of an
officer-level security position.
Security Positions
The following positions are recommended for security
organizations. Other positions also exist outside
the formal security organization, because everyone in the
business has some level of responsibility for
security. For example, every employee is responsible for
protecting their passwords, their login sessions,
and any confidential information they handle. General
managers, department heads, and operational
leads are responsible for being familiar with security policy and
keeping an eye on the security practices
of their subordinates. They are responsible for ensuring that
violations are reported, and may carry out
enforcement policies.
Figure 6-1 shows an example security responsibility hierarchy,
with some descriptions of responsibilities
that might pertain to each position.
Figure 6-1 Example security organization
Chief Security Risk Officer (CSRO) or Chief Information
Security Officer (CISO)
This position is an executive staff member, with ultimate
accountability for all security efforts for the
business. The CSRO oversees all aspects of risk management
across the enterprise, or in organizations
without a formal risk management department, the CISO
oversees the information security function and
incorporates risk management into that function. In
organizations where the CSRO is responsible for all
types of risks across the business (including financial risks,
business risks, and other non-IT risks), the
person in that role will generally establish an IT risk function to
oversee IT-related risks in particular,
since the management of IT risks represents a unique discipline
requiring specialized knowledge.
Otherwise, the CISO performs that role. The CSRO or CISO
should report to the chief executive officer
(CEO), chief operating officer (COO), or the Board of
Directors. While some organizations may consider it
controversial to elevate the position to equal par with chief
executives, the criticality of addressing
corporate risk and legal compliance justifies the decision. The
CSRO or CISO is a champion and defender
of security and risk initiatives for the business, bearing overall
responsibility for risk assessment and risk
management. The CRSO or CISO may hold certifications related
to information security, audit, risk
management, and disaster recovery.
In collaboration with the executive staff, the CSRO or CISO
should:
• Ensure the business has risk management skills in its human
capital
• Establish an organizational structure that supports a risk
management strategy
• Implement an integrated risk management framework
• Define the business’ risk appetite in terms of loss tolerance
• Ensure the business can absorb the risk in terms of human and
financial resources
• Establish risk assessment, management, response, mitigation,
and audit procedures
• Influence the business’ risk culture and provide
organizational learning opportunities
Security Director
The security director works with the executive team to
accomplish business goals. This position requires
expert communication, negotiation, and leadership skills, as
well as technical knowledge of IT and
security hardware. While a person who has experience as a vice
president may already possess these
skills, the focus of the security director should be security-
oriented and they should be experienced in
information security decision making. The security director has
responsibility to oversee and coordinate
security efforts across the business, including IT, HR,
Communications, Legal, Facilities, and other
departments, to identify needed security initiatives and
standards.
The security director, among other responsibilities:
• Coordinates the security-related strategic and visionary goals
of the business
• Oversees security management and vendors who safeguard the
business’ assets, intellectual property,
and computer systems, as well as the physical safety of
employees and visitors
• Identifies protection goals and objectives consistent with
corporate strategic plans
• Manages the development and implementation of global
security policy (rules), standards (minimum
requirements), guidelines (recommendations), and procedures
(step-by-step instructions) to ensure
ongoing maintenance of security
• Maintains relationships with local, state, and federal law
enforcement and other related government
agencies
• Oversees the investigation of security breaches and assists
with disciplinary and legal matters
associated with such breaches as necessary
• Works with outside consultants as appropriate for
independent security audits
• Participates in the business’ change management process at
the organizational and strategic level
• Is fluent with the various aspects of the risk management
framework
Security Manager
The security manager has day-to-day responsibility for all
security-related activities and incidents. All
operational security positions report to this position. The
security manager is responsible for
management and distribution of the security policy, policy
adherence and coordination, and security
incident coordination.
The security manager also assigns and determines ownership of
data and information systems. In
addition, this person also ensures that audits take place to
determine compliance with policy. The
security manager also makes sure that all levels of management
and administrative and technical staff
participate during planning, development, and implementation
of policies and procedures.
Many of the security manager’s functions can be delegated,
depending on the staffing requirements and
individual skill sets of the security organization. However, the
security manager bears accountability for
ensuring that these functions take place effectively.
Certifications that a security manager may hold include
Information Assurance Manager (IAM) or
equivalent and Certified Information Security Manager (CISM)
from ISACA.
In addition to other roles, the security manager:
• Develops and maintains a comprehensive security program
• Develops and maintains a business resumption plan for
information resources
• Approves access and formally assigns custody of the
information resources
• Ensures compliance with security controls
• Plans for contingencies and disaster recovery
• Ensures that adequate technical support is provided to define
and select cost-effective security
controls
Security Architect
This person has ultimate responsibility for the security
architecture, including conducting product
testing and keeping track of new bugs and security
vulnerabilities as they arise. The security architect
produces a detailed security architecture for the network based
on identified requirements and uses
this architecture specification to drive efforts toward
implementation.
In addition to other roles, the security architect:
• Identifies threats and vulnerabilities
• Identifies risks to information resources through risk analysis
• Identifies critical and sensitive information resources
• Works with the data owner to assess and classify information
• Works with technical management to specify cost-effective
security controls and convey security
control requirements to users and custodians
• Assists the security manager in evaluating the cost-
effectiveness of controls
Security Engineer
The primary role of this position is the technical
implementation of the architect’s designs. The security
engineer works directly with the architect on design decisions
and with the administrator on device
management decisions. Security engineers generally have a
degree in engineering or computer science,
along with extensive technical training or experience, and they
often hold Certified Information Systems
Security Professional (CISSP) certification and other technical
certifications in their field of expertise.
A security engineer may perform the following duties:
• Installation and configuration of networks and network
devices such as web application firewalls,
network firewalls, switches, load balancers, and routers
• Security configuration of Unix, Linux, or Windows servers
• Security configuration of applications and databases
• Installation, configuration, and design of security tools,
including development and coding
• Security incident investigation, including network packet
capture
• Maintenance and monitoring of network and host intrusion
detection and prevention technologies
Security Administrator
Every security organization has security administrators, as
many as needed to implement security on a
day-to-day, operational/tactical basis at the facility. The
security administrator executes all actions
directed by the security architect, security engineer, security
manager, or as required by security policy
or incident response procedures. The security administrator is
responsible for ensuring all appropriate
security requirements are met and maintained on all computers,
networks, and network technologies,
including patch management and operating system upgrades.
The security administrator is often the first person contacted
whenever there is a suspected or known
security problem. This person has the operational/tactical
responsibility for ensuring that the business,
its reputation, and its assets are protected and has the authority
to take any and all action necessary to
accomplish this goal.
Among other duties, the security administrator:
• Implements the security controls specified by the security
architect, security engineer, and security
manager
• Implements physical and procedural safeguards for
information resources within the facility
• Administers access to the information resources and makes
provisions for timely detection, reporting,
and analysis of actual and attempted unauthorized access to
information resources
• Provides assistance to the individuals responsible for
information security
• Assists with acquisition of security hardware/software
• Assists with identification of vulnerabilities and other data
gathering activities and log file analysis
• Develops and maintains access control rules
• Maintains user lists, passwords, encryption keys, and other
authentication and security-related
information and databases
• Develops and follows procedures for reporting on monitored
controls
Security Analyst
The primary role of this position is to support the security
architect, security engineer, security
administrator, and security management in analyzing and
producing reports required for the assessment
and smooth functioning of security operations. The security
analyst may hold vendor-oriented
certifications such as those offered by Cisco, Microsoft,
Enterasys, Symantec, Oracle, and McAfee.
Among other duties, the security analyst:
• Monitors alerts and reports generated by security systems
• Reviews log files as generated by security devices and
servers, making note of anomalies
• Compiles reports as required by management or as specified
by security policy
• Maintains security metrics
• Collaborates with security organization team members to
assess and analyze security operations and
suggests improvement
• Manages quality control and change management initiatives
for the security organization
• Maintains security policy documentation and ensures that
necessary changes are incorporated as
directed by the architect or management
Security Investigator
This position is responsible for Legal, HR, and internal
investigations into security incidents, breaches,
attacks, and violations. The security investigator often works
closely with law enforcement agencies as
needed. Skills required include technical expertise as well as
evidence handling and forensic procedures.
The security investigator may hold industry-related
certifications in forensics and incident response.
Among other duties, the security investigator:
• Responds to requests from HR, Legal, and other internal
departments to investigate incidents
• Coordinates with outside attorneys or law enforcement
representatives
• Collects and preserves evidence from computer systems
• Performs e-discovery and forensic searches for keywords and
patterns
• Produces detailed reports on investigations
• Provides information to the HR and Legal departments for
action
• Maintains strict secrecy about ongoing investigations
Security Awareness Trainer
The primary role of this position is to develop and deliver
security awareness training to the business
based on corporate security policy, standards, procedures, and
guidelines. The trainer generally has a
background in security as well as in education and training. The
trainer coordinates and collaborates
with the security department subject matter experts to ensure
that the training is both comprehensive
and accurate. This position may alternatively reside in another
department within the business, typically
Human Resources or Communications.
An important characteristic of this position is that the skill set
required for the delivery of effective
security awareness training is not often found within an IT
department, yet the position requires
detailed security knowledge. Assigning security engineers and
security administrators to produce
training materials can be ineffective, due to the highly technical
nature of their work and the
requirement for delivering training in “plain English.” The
trainer must be skilled in interpreting technical
information for the business’ employees in a way that is
understandable, fresh, interesting, and highly
relevant.
Facility Security Officer
The primary role of this position is to enforce the business’
physical security policy at each building
location. Each major facility location should have a security
officer responsible for coordinating all
physical security–related activities and incidents at the facility.
The person in this position is not the
same person who is operationally responsible for the computer
equipment at the facility. The facility
security officer has the authority to take action without the
approval of the management at the facility
when required to ensure physical security. This position also
typically works within a Facilities
department rather than IT.
All physical security reports are reviewed by the facility
security officer. For example, this position
reviews log files of facility access records, such as key card
logs. The facility security officer is responsible
for coordinating all activities related to security incidents at the
facility and has the authority to decide
what actions are to be taken as directed by the incident response
procedures. The facility security
officer coordinates all activities with the corporate security
manager, director, or vice president.
Application Security Functions
In organizations that develop in-house code for applications
used internally, depending on the size and
complexity of the application development process there may be
a justification for at least one
application security specialist. This person would need to be
highly knowledgeable about the
programming languages being used, and well-trained in security
programming techniques (as described
in Chapters 26 through 30 of this book). The role of this job
function is to provide guidance and training
to programmers on how to write secure code, and to review
every line of code produced by the
programmers for security vulnerabilities and flaws. Commercial
code scanners and application testing
technologies would also be used by the person in this role to
scan and test in-house software for flaws.
Alternatively, an outside organization may be contracted to
perform code reviews and scanning. Code
review and sign-off by this security function should be required
before promoting any code to
production.
Business Continuity and Disaster Recovery Planning Functions
Depending on the size of the business, business continuity
planning (BCP) and disaster recovery (DR)
planning and testing may be done by one person (in smaller
organizations) or several people in each
function (in larger organizations). The question of whether
these functions belong within the security
organization is best determined by the needs of the business.
Generally speaking, smaller businesses
that have these functions performed by one or two people
should place them in the security
organization, while larger businesses may benefit from a
dedicated organization for BCP and DR. A good
rule of thumb is that they should be part of the information
security organization if their work is
primarily technical in nature, whereas they should reside
elsewhere in the business if their focus is more
business-oriented than technical. Chapter 32 covers these
functions in more detail.
Non-Security Jobs with Security Responsibilities
Several individuals in a business have important responsibilities
in the maintenance of security. These
individuals may or may not focus exclusively on security in
their jobs. Some of these positions are
security positions; others are held by people who are
responsible for keeping the business secure even if
their primary job is something else.
Every IT department has system and network administrators.
Sometimes these are the same person;
sometimes the duties are divided among different individuals or
departments. Regardless of the
reporting structure, the system and network administrators bear
important security responsibilities.
System administrators build new computer systems; install
operating systems; install and configure
software; and perform troubleshooting, maintenance, and
repairs. In the course of all these functions,
system administrators apply security standards and policies.
Operating systems must be installed in
compliance with the security standards for their particular
application. This usually includes turning off
unneeded services (known as hardening), applying the latest
security updates and patches, and applying
templates and secure configurations to software applications.
Any oversight or failure to consider the
security of the system can compromise the entire organization,
so the system administrator position is
crucial to the success of the security program.
Network administrators have responsibilities and levels of
access that require them to conform to
security standards and policies as well. Often, the network
administrator is responsible for firewall and
router configurations that apply the business’ security policy in
specific situations. Incorrect or
inappropriate configuration choices can open up security holes
that put the entire business at risk.
Data that is resident on computer systems, shared storage
devices, databases, and applications must be
handled securely. This means encrypting data in storage (or at
rest) and data in transit, performing
change control, and implementing access controls and
authorization levels to ensure that only the right
people can get to the information. The operational responsibility
for this data security management falls
into the domains of the data owners and the data custodians.
Data owners make the decisions that
determine who should modify, view, change, and create
information files. The owner of each piece of
data should identify who is the intended audience, who can
make changes, and who can erase the data.
The data custodian implements the decisions of the data owner
by making approved changes,
presenting the data to the appropriate audience, and properly
destroying the data when it is deleted.
When sensitive data is strongly overwritten, the data custodian
ensures that the data is properly
destroyed.
Security Incident Response Team
Security incident response teams are known by several names.
Some are called SRT for security
response team, some are called CIRT for computer incident
response team, and some are called IRT for
incident response team (which is the term used in the following
discussion). Regardless of the specific
terminology, these teams are collections of individuals from
various parts of the business who are
brought together to handle emergencies. They join the team
apart from their daily responsibilities in
order to prepare, practice, and drill for potential emergencies
and, in the event of an actual emergency,
handle the situation.
Examples of the types of incidents a response team might
handle include
• Hostile intrusions into the network by unauthorized people
• Damaging or hostile software loose on a system or on the
network
• Unauthorized access or acceptable use violations resulting in
the need for investigations of personnel
• Virus activity
• Software failures, system crashes, and network outages
• Participation in external investigations by law enforcement,
government regulators, or international
watchdog and legal organizations
• Court-ordered discovery, evidentiary, or investigative legal
action
• Illegal activities such as software piracy
Every business performs incident response, whether or not they
have an official IRT established. In many
businesses where there is no IRT, individual employees perform
incident response by dealing with
incidents in their own way. A software virus outbreak is one
example. In businesses without an IRT,
employees may choose to install antivirus software, run
specialized virus cleaning software, or just live
with a virus infestation. In these situations, no coordination
happens and virus response varies with each
individual, usually without enterprise-wide success. One
advantage of an organized IRT is that it can deal
with incidents like this on a higher level, with more
comprehensive success.
Members of an IRT should include technical experts who can
evaluate incidents like network intrusions,
software failures, and virus outbreaks on a technical level;
administrators who can keep logs and
maintain the paperwork and electronic information associated
with an incident investigation; managers
who coordinate the work of the IRT members; and, if available,
IRT specialists who have served on prior
IRTs. None of these individuals necessarily needs to be
assigned to the IRT as a full-time position.
Typically, businesses that establish an IRT leverage employees
from many other parts of the business
and ask them to share their responsibilities between their
regular job and the IRT.
An IRT can be assigned individuals with specific technical
expertise in a variety of areas. Depending on
the business and the types of technologies used in the
infrastructure, this expertise may include
• Virus management
• Hostile software detection and management
• Vulnerability analysis
• Specific hardware platforms
• Specific operating systems
• Commercial off-the-shelf or open source tools and
applications
• Custom-developed or in-house-developed software and/or
scripts
The IRT should have a clearly defined depth of standard
investigations, because investigations become
more expensive and time-consuming as they go deeper. The
basic investigative lifecycle includes
Preparation, Identification, Detection, Eradication, Recovery,
and Lessons Learned. The IRT may also
need to prioritize its activities, especially in cases where several
incidents happen at once, and this
prioritization should be directed by management rather than the
individual team members, to keep the
team aligned with the corporate goals.
Daily IRT operations can include interpretation of reported
incidents; prioritization and correlation with
existing efforts; evaluation of current trends and industry
experiences; verification that incidents are
real; categorization of incidents; and summarization and
reporting to management, end users, and
outside agencies. Once incidents are identified and evaluated,
removal of the cause by blocking or fixing
the exploited vulnerability and restoration of the original state
of the impacted system or network can
be performed. During the entire process, a careful log and audit
trail should be preserved, and
information gathered should be evaluated to determine how to
improve IRT operations in the future
(and this information may be required for legal purposes if
prosecution is pursued).
Many aspects of an IRT’s actions can be identified, categorized,
and codified. These actions should be
documented as part of an operational procedure manual. This
allows individual team contributors to
make informed and appropriate decisions during the heat of an
incident. Operational procedures can
include standard incident response process, vulnerability
analysis and remediation, communication with
other groups and with the general business entity, coordination
with law enforcement and the court
system, and evidence handling and audit trail maintenance.
Many businesses want to have their own in-house IRT, so the
team can integrate into the corporate
culture and become more informed and effective. Others prefer
to outsource this function to avoid
having to hire incident response specialists. Outsourcing carries
the additional advantage of pay-as-you-
go, where costs associated with incident response occur only
when the IRT is activated during an
incident. Incident handling should be done according to a
consistent set of well-documented
procedures, in case a court proceeding is required. Investigation
manuals are available from a variety of
sources that can be used to guide the investigator.
Managed Security Services
Most organizations, whether large or small, have difficulty
achieving a high enough level of information
security to comply with industry best practices. Very few
businesses invest in an internal security
organization with enough resources to do everything the
business would like to do. Most businesses
realize this but continue to do business with the hope that
nothing bad will happen.
However, more businesses are beginning to recognize the value
of outsourcing services that are not
central to their core business. It’s rare for modern businesses to
hire their own cafeteria staff or
housekeeping staff or, in many cases, even handle their own
payroll. It would be unthinkable for most
businesses to maintain a force of air transportation. Now, other
types of services are beginning to come
under the same scrutiny for efficiency, quality, and cost-
effectiveness.
Managed Security Service Providers (MSSPs), outside firms
contracted by businesses to perform specific
security tasks, are becoming increasingly popular and viable for
modern businesses. These firms are
businesses that hire specialized staff with expertise in focused
areas such as firewall management,
intrusion-detection analysis, and vulnerability analysis and
remediation. Often, these companies are
able to hire specialists that are more advanced than what other
businesses can afford, because of their
specialization. Their customers are then able to gain access to
this expertise without having to pay the
salaries and infrastructure costs, which are absorbed by the
MSSP.
There are four good reasons to look to an information security
provider for outsourced services:
• Security expertise is not found in-house.
• Security is required 24×7×365 while functionality may be
required only for certain business windows
(for example, 8 A.M. to 5 P.M.).
• Vast amounts of data must be examined.
• Specialized skill sets are hard to find.
A security infrastructure requires constant vigilance. It’s not
enough to rely on automated software that
can be tricked, or might crash, or may overlook important
scenarios. Human intelligence is needed to
analyze activity and make decisions on the spot. It’s not enough
to have one person with a mobile
phone—three shifts are required. Moreover, intruders don’t take
vacations, and they attack from all the
different time zones.
Identifying security threats and making decisions about how to
respond involves sifting through log files,
network activity, and configurations. False positives, true
positives, false negatives, and true negatives
are all possible outcomes from an inspection—one system
communicating legitimately with another
may appear to be an attack, or a system administrator
performing a routine upgrade may look like an
intruder. Somebody needs to be able to investigate these
situations properly to determine the most
appropriate response.
All of this requires advanced skills. Experienced security
specialists are hard to find, but security service
providers can attract senior-level staff because the people who
specialize in security are attracted to
businesses that focus on their field of expertise.
MSSPs must adhere to an organization’s policy, standards,
procedures, and guidelines and should be
subject to auditing.
Outsourcing security functions to MSSPs changes the business
equation from one of running and
managing a 24×7 operation in an in-house shop to vendor
management. Most businesses are more
experienced with the latter than the former, but the key to
success is to manage the vendor properly to
meet the expectations and needs of the business. There are pros
and cons associated with outsourcing
security operations to MSSPs.
Benefits and advantages include
• Experience
• Cost savings
• Fast implementation
• Adaptability
• Infrastructure
Liabilities and disadvantages include
• Delays in processing events and incidents
• Failure to adhere to service level agreements
• Performance that does not meet expectations
• Inability to perform timely investigative responses
• Inability to align to the primary business’ mission and
business objectives
When information security is the primary business of an
organization, that organization will have a
strong business motivation to invest in a world-class security
infrastructure. In addition, that
organization will work with many different customers with
widely varying environments, and it will
implement many different types of security solutions.
Information security providers bring this
experience to bear in their customers’ environments, providing
a level of quality that can’t be matched
by organizations that don’t specialize in security.
In general, service providers may save their customers money
by performing a service more efficiently
than the customers can perform it on their own. Service
providers leverage their staff of specialists to
service many different accounts, thus giving everyone the
benefit of industry leadership. Additionally,
they often produce methodologies, best practices, and standards
that can be applied in their business
relationships. These business tools often enable service
providers to provide significant cost savings to
their customers.
Many projects fall behind schedule or have difficulty getting off
the ground due to lack of resources,
management support, financing, or effective project
management. Service providers often avoid these
problems by applying all these components in a focused way to
the projects on which they are engaged.
Service providers have a strong business motivation to succeed
in the projects they take on.
Because security providers work with many different
technologies and products, they have a level of
flexibility often denied to other organizations. The number of
security specialists most organizations can
afford to employ is usually much smaller than the number a
security provider can afford to employ, and
the former’s staff usually has a skill set that is limited to the
products with which the staff members
have personally worked. This gives service providers the
advantage of flexibility, since their staff is larger
and more focused on the task at hand.
Unlike with most organizations, the information security
infrastructure of a security provider is revenue-
generating rather than an expense. For that reason, the security
provider can apply a greater amount of
resources to developing its infrastructure and can leverage that
infrastructure to the advantage of the
customer. Security providers have the motivation to spare no
expense to produce a world-class
infrastructure, and their customers reap the benefits.
Services Performed by MSSPs
On Internet connections, wide area networks, and local area
networks, MSSPs provide
• Incident detection
• Incident logging
• Proactive response
• Reactive response
Different zones of an organization’s data network can be
monitored and managed from a security
perspective. Typically, these can include the corporate LAN, the
WAN connections to remote sites, and
connections over public networks such as the Internet and even
cloud services. Many organizations have
virtual private networks (VPNs) to connect employees to their
network or to connect other sites, and
many organizations also have extranet connections to partners,
service providers, and customers.
Each of these zones should be managed and monitored from a
security perspective, and each should
adhere to strong security principles. Each will have differing
requirements for access and privacy.
Whenever a problem occurs, such as unauthorized access or
misuse, detecting the incident is crucial to
the success of an organization’s security. Recent data losses by
some well-known companies were not
detected right away and left those companies embarrassed after
the incidents were reported in the
press. In some highly publicized cases, those companies did not
know for several weeks that they were
taken advantage of.
Potentially even more important than the loss of PR is the loss
of opportunity when incidents go
undetected. Security violations that are detected right away can
be dealt with during the incident, which
not only affords the opportunity to shut down the attack before
serious harm occurs, but also prevents
the loss of credibility that is crucial to many organizations’
customer relationships. Incidents in progress
can also be logged in detail for potential legal action or for
further investigation after the incident has
concluded.
Many organizations desire proactive response, which is to say,
prevention of security violations before
they take place. Blocking attacks while continuing to perform
logging of data can be of great value to an
organization. Reactive response is also important; it usually
involves human interaction to determine
what course of action is best for the business, up to and
including disconnection of service—a decision
that might cost an organization thousands of dollars in lost
revenue but may save millions in lost data.
Decisions like that require a quick link between the people
monitoring the security and the people
making the business decisions.
Services That Can Be Monitored by MSSPs
Security service providers can provide monitoring of many
different types of activities. MSSPs will
typically monitor the network for unusual or suspicious activity
and identify anything that requires direct
intervention or incident response. In such cases, they either
raise an alert to IT or information security
staff, or they may perform a direct intervention if they have the
access and ability (and the contract
provides this service). The activities that may be monitored by
an MSSP include
• Unauthorized access attempts to firewalls, systems, and
network devices
• Port scanning
• System intrusion detection originating from a protected
system behind a firewall
• Network intrusion detection originating from “probe” devices
connected to the protected internal
network
• Root and administrator account usage
• Denial of services
• Other relevant security events
Many security service providers can also provide additional
value-added services, such as:
• Detection of nonstandard behavior of services
• Detection of changes to systems
• Reduction of false alarms by employing human intelligence
• Correlation between events on the internal network and the
Internet
• Providing updates of the latest security products, threats, and
vulnerabilities
• Scanning and reporting on vulnerabilities
• Support and training
Many organizations want to know about authorized as well as
unauthorized activities. Managing a data
infrastructure is a complex business, and knowing what
constitutes a normal pattern of behavior can be
a significant asset to managers.
Security Council, Steering Committee, or Board of Directors
The security organization should be included in all efforts that
involve corporate data and resources.
Many different departments handle data, not just IT. For
example, the HR department handles
confidential employee information. The Legal department
handles confidential business and customer
information. The Facilities department may handle badging and
physical access. Generally speaking,
every major department in the business has some level of
interaction with business resources and data.
All of these departments should coordinate with the security
organization. In most businesses, the
security team meets with almost every manager of the business,
and sometimes with most of the
employees.
A security council or steering committee, whose members
include representatives from each major
business department, provides a forum for information exchange
that facilitates the job of the security
practitioner and identifies business requirements to which the
security organization should be privy.
Each security council representative provides status updates of
initiatives within that representative’s
organization, and each receives information from the security
organization about initiatives and
practices that impact each of them.
The security council can be used in a variety of ways.
Information gathering is one important
opportunity. Members of the security council have unique
visibility into the operation of their part of
the business. This visibility is important to the
comprehensiveness of the security practitioner’s focus.
For example, a department that is considering a new technology
initiative may not have considered the
security impact on the rest of the network, but the security
practitioner, upon hearing about the
initiative, may make conceptual connections overlooked by the
individual department.
A security council or steering committee can also be an
effective risk management tool. The purpose of
a risk analysis is to identify as many business risks as possible,
and then either accept, mitigate, or
transfer those risks. Any risks that are overlooked by a risk
analysis put the business in jeopardy if any of
those risks become realized. Members of the security council
can be polled to identify specific business
risks in each of their specialties, and this provides a risk
analysis with a greater scope and better
coverage.
Another advantage is that it gives a sense of participation and
teamwork to business departments that
may otherwise act independently without consulting each other,
or even compete for resources or
produce conflicting infrastructures.
Interaction with Human Resources
Human Resources departments need to provide required
information about new hires to security
administrators before the new hires’ start date. This is an
important interaction between HR and IT,
even if the security organization is not part of the hiring
procedure. Security administrators need to
know at any point in time whose employment with the business
is valid, so they can properly maintain
and monitor accounts on systems and on the network. Perhaps
even more important, HR also reports
required information about terminations to system
administrators before the final termination occurs.
The security organization is always involved in terminations to
some extent, because employee
terminations result in the revocation of trust. When trust is
revoked, assurance must be provided that
all access has been revoked, and activity must be monitored to
ensure the maintenance of that
revocation.
HR manages contractor information and provides this
information to security administrators.
Contractors, as temporary employees, present special probl ems
to security administrators. They often
work for only a short time and sometimes come and go,
resulting in a constant process of granting and
revoking physical access and system and network accounts. It’s
hard to tell when seeing a contractor in
the hallways whether they should be there or not. The security
of the network relies heavily on the
timely transfer of information from HR to the security
organization. HR, in turn, requires timely
information from individual managers regarding the status of
their contractors hired directly and
managed individually.
HR performs background checks, credit checks, and reference
checks on new employee applicants. Exit
interviews are conducted with terminating employees to recover
portable computers, telephones, smart
cards, business equipment, keys, and identification badges and
to identify morale problems if they exist.
Employees discharged for cause must be escorted from the
premises immediately and prohibited from
returning, both to reduce the threat of retaliation and to forestall
any questions if unexpected activity
occurs on the network or on the premises.
Monitoring the activities of employees is a matter of corporate
culture—those organizations that want
to do it differ in the extent and type of response they choose.
Likewise, the treatment of confidential
and private information differs from business to business, but
these are issues that should be dealt with
by every organization. If an organization hasn’t gotten around
to a formal policy on these issues, the
best time to start is now, before a policy violation occurs when
there is no clear, documented policy that
has been communicated to all employees. Communication is
truly the key to successful security
management. Physical security should not be overlooked, and
periodic fire drills can be used to test
security measures, help close any gaps, and avoid the danger of
having a false sense of security.
Summary
Every business needs a risk management approach that is
headed by a top level organization, dedicated
to risk management and information security. This organization
requires executive-level representation
in the business, because the management of risks related to
information security is ultimately the
responsibility of senior management—whether the business is
regulated or not, the top executives are
on the hook for any consequences that occur due to failure of
security controls. The CSRO or CISO is the
highest level of security manager in midsize and larger
businesses, with ultimate responsibility for all
security efforts for the business. Regardless of the specific
functions within the security organization, the
definition of who does what should be well defined in an org
chart with clear responsibilities assigned to
each individual, so security can be properly managed. Security
functions include strategic positions such
as management, architecture, and policy specialists, as well as
operational positions such as
administrators, analysts, and investigators. Other functions such
as BCP, DR, and physical security may
also reside within the information security organization,
depending on the nature of the business.
In addition to these full-time roles, security response teams are
comprised of collections of individuals
from various parts of the business who are removed from their
daily responsibilities and brought
together to prepare, practice, and drill for emergencies, and
these are the people who handle
emergencies when they arise. Further, a corporate security
council or steering committee, whose
members include representatives from each major department in
the business that are stakeholders in
the end result of the security program, provides a forum for
information exchange and input into the
decisions that shape the security program.
For those functions not staffed internally, MSSPs are an option.
These outside firms are contracted by
businesses to perform specific security tasks such as
monitoring, alerting, and incident response. MSSPs
are becoming increasingly popular for many security roles
because they can be less expensive, more
efficient, and more effective than what many businesses are
capable of building in-house (especially for
24 × 7 service).
References
Bassett, Jackie, and Dan Rothman. A Seat at the Table for CEOs
& CSOs. Digital edition. AuthorHouse,
2007.
Collette, Ron, Michael Gentile, and Skye Gentile. CISO Soft
Skills: Securing Organizations Impaired by
Employee Politics, Apathy, and Intolerant Perspectives.
Auerbach Publications, 2008.
Erbschloe, Michael. The Executive’s Guide to Privacy
Management. McGraw-Hill/Osborne, 2001.
Fitzgerald, Todd, and Micki Krause. CISO Leadership: Essential
Principles for Success. (ISC)2 Press, 2007.
Gentile, Michael, Ron Collette, and Thomas August. The CISO
Handbook: A Practical Guide to Securing
Your Company. Auerbach Publications, 2005.
Kovacich, Gerald L. The Information Systems Security
Officer’s Guide. 2nd ed. Butterworth-Heinemann,
2003.
Lam, J. “Enterprise-Wide Risk Management and the Role of the
Chief Risk Officer.” ERisk.com, March 25,
2000.
Soo Hoo, K. “How Much Is Enough? A Risk-Management
Approach to Computer Security.” Presented at
the Workshop on Economics and Information Security,
University of California at Berkeley, May 2002.
NAME:
TODAY’S DATE:
ISEC 610 Homework 2
Question 1
Match policies, standards, procedures, and guidelines described
in Chapter-5 with the security roles described in Chapter-6.
There are two sample rows. Fill out five extra rows similarly.
Document example
Security role
Description of the relationship
IDS/IPS maintenance/monitoring procedure
Security Engineer (SE)
SE develops this procedure. SE performs IDS/IPS maintenance
and monitoring according to this procedure. SE is responsible
for updating this procedure.
Organization-wide security policies
Security Director (SD)
SD manages the development and implementation of global
security policies
Question 2 – Weekly learning and reflection
In two to three paragraphs of prose (i.e., sentences, not bullet
lists) using APA style citations if needed, summarize and
interact with the content that was covered this week in class. In
your summary, you should highlight the major topics, theories,
practices, and knowledge that were covered. Your summary
should also interact with the material through personal
observations, reflections, and applications to the field of study.
In particular, highlight what surprised, enlightened, or
otherwise engaged you. Make sure to include at least one thing
that you’re still confused about or ask a question about the
content or the field. In other words, you should think and write
critically not just about what was presented but also what you
have learned through the session. Questions asked here will be
summarized and answered anonymously in the next class.

More Related Content

DOCX
CHAPTER 5 Security Policies, Standards, Procedures, a
PDF
For our discussion question, we focus on recent trends in security t.pdf
PPTX
Planning for security and security audit process
PDF
Information security policy how to writing
PPT
Application of Q methodology in critical success factors of information secur...
PPT
Policy-1.pptznlaldjwodmwlznalpqjdc ktpanV
PPT
Start With A Great Information Security Plan!
PPTX
Security Plans & Policies in Cybersecurity.pptx
CHAPTER 5 Security Policies, Standards, Procedures, a
For our discussion question, we focus on recent trends in security t.pdf
Planning for security and security audit process
Information security policy how to writing
Application of Q methodology in critical success factors of information secur...
Policy-1.pptznlaldjwodmwlznalpqjdc ktpanV
Start With A Great Information Security Plan!
Security Plans & Policies in Cybersecurity.pptx

Similar to There are two general types of data dictionaries a database manag (20)

PDF
Chapter 7 Managing Secure System.pdf
PPT
CLE-Unit-III.ppt
PPTX
unit 3 security plans and policies.pptx
PPTX
Human Factors_MODULE_2.pptx
PPT
Policy formation and enforcement.ppt
PPTX
D1 security and risk management v1.62
PPT
Information security policy_2011
PPT
Information security policy_2011
PPT
Chapter 5 Planning for Security-students.ppt
PDF
Solve the exercise in security management.pdf
PPT
Security Manager - Slides - Module 10.ppt
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
PPT
Security Manager - Slides - Module 4 Powerpoint Presentation
DOCX
What are policies procedures guidelines standards
PPTX
ISO27001_COBIT_Students.pptx
PPT
Ch14 Policies and Legislation
PPTX
Security Policies and Standards
PPTX
crisc_wk_2a.pptx
DOCX
To meet the requirements for lab 10 you were to perform Part 1, S
Chapter 7 Managing Secure System.pdf
CLE-Unit-III.ppt
unit 3 security plans and policies.pptx
Human Factors_MODULE_2.pptx
Policy formation and enforcement.ppt
D1 security and risk management v1.62
Information security policy_2011
Information security policy_2011
Chapter 5 Planning for Security-students.ppt
Solve the exercise in security management.pdf
Security Manager - Slides - Module 10.ppt
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
Security Manager - Slides - Module 4 Powerpoint Presentation
What are policies procedures guidelines standards
ISO27001_COBIT_Students.pptx
Ch14 Policies and Legislation
Security Policies and Standards
crisc_wk_2a.pptx
To meet the requirements for lab 10 you were to perform Part 1, S
Ad

More from GrazynaBroyles24 (20)

DOCX
6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx
DOCX
6 pages which reach all of requiements below hereAn essay inclu.docx
DOCX
54w9Performing Effective Project Monitoring and Risk Management.docx
DOCX
5I need a fiive page paper with title page, reference page in APA fo.docx
DOCX
6 pages paper for International relations class Knowledgeable Econo.docx
DOCX
50 words minimum This weeks audio is very informative but o.docx
DOCX
500 word discussion on the passage to answer question at the botto.docx
DOCX
5. An electric motor accomplishes what task[removed]convert.docx
DOCX
5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx
DOCX
500 wordsAPA FormatScenarioYou are a probation officer a.docx
DOCX
500 words- no references. Must be original, no plagiarism.docx
DOCX
5.5 - Beginnings of the Space ProgramIn this discussion activi.docx
DOCX
5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx
DOCX
500 words APA formatHow much impact do managers actually have on a.docx
DOCX
5.2Complete one of the following options for your Week 5 Assignm.docx
DOCX
5.1 DBDisparities exist among racial and ethnic groups with rega.docx
DOCX
5. What are the most common types of computer-based information syst.docx
DOCX
5.2 - Postwar Commercial AviationIn this discussion activity, .docx
DOCX
5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx
DOCX
5-6 paragraphs Interagency is relatively recent as a term, y.docx
6 Pagesewly appointed Police Chief Alexandra Delatorre of the An.docx
6 pages which reach all of requiements below hereAn essay inclu.docx
54w9Performing Effective Project Monitoring and Risk Management.docx
5I need a fiive page paper with title page, reference page in APA fo.docx
6 pages paper for International relations class Knowledgeable Econo.docx
50 words minimum This weeks audio is very informative but o.docx
500 word discussion on the passage to answer question at the botto.docx
5. An electric motor accomplishes what task[removed]convert.docx
5.4 - Commercial Air Travel during the 1950’s – 1960’sIn this .docx
500 wordsAPA FormatScenarioYou are a probation officer a.docx
500 words- no references. Must be original, no plagiarism.docx
5.5 - Beginnings of the Space ProgramIn this discussion activi.docx
5.3 - Discussion Ethical issuesReview the pros and cons of glob.docx
500 words APA formatHow much impact do managers actually have on a.docx
5.2Complete one of the following options for your Week 5 Assignm.docx
5.1 DBDisparities exist among racial and ethnic groups with rega.docx
5. What are the most common types of computer-based information syst.docx
5.2 - Postwar Commercial AviationIn this discussion activity, .docx
5-6 paragraphsYou and Officer Landonio are on patrol. Yo.docx
5-6 paragraphs Interagency is relatively recent as a term, y.docx
Ad

Recently uploaded (20)

PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
master seminar digital applications in india
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Institutional Correction lecture only . . .
PDF
Classroom Observation Tools for Teachers
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Insiders guide to clinical Medicine.pdf
PDF
TR - Agricultural Crops Production NC III.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Week 4 Term 3 Study Techniques revisited.pptx
STATICS OF THE RIGID BODIES Hibbelers.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
master seminar digital applications in india
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Supply Chain Operations Speaking Notes -ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
01-Introduction-to-Information-Management.pdf
Institutional Correction lecture only . . .
Classroom Observation Tools for Teachers
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Final Presentation General Medicine 03-08-2024.pptx
Insiders guide to clinical Medicine.pdf
TR - Agricultural Crops Production NC III.pdf
Microbial diseases, their pathogenesis and prophylaxis
102 student loan defaulters named and shamed – Is someone you know on the list?
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Complications of Minimal Access Surgery at WLH
Abdominal Access Techniques with Prof. Dr. R K Mishra

There are two general types of data dictionaries a database manag

  • 1. There are two general types of data dictionaries: a database management system data dictionary and an organization-wide data dictionary. For this assignment, we are focusing on the organization-wide data dictionary. In a data dictionary, individual data elements and definitions are defined to ensure consistency and accuracy. Assume you need to collect and analyze data on patients discharged and readmitted to hospital X within 90 days of discharge. Develop the data dictionary for this study by completing the table below. Your data dictionary must include a minimum of 15 discreet data elements. Include information you would need to identify: · the patient (Unique identifier) · the admission(s) · the reason for each admission (why the patient presented to the hospital emergency department) · the principal diagnosis which is defined as the condition of the patient made after studying the patient and their admission to the hospital. · the indicator for justified readmission or questionable readmission. Guided response: Include at least 15 data elements and the rationale for each data element, using the format below and include: · A title page with the following: · Title of paper · Student’s name · Course name and number · Instructor’s name · Date submitted · Include two scholarly references, excluding the textbook, formatted according to APA style as outlined in the Writing Center.
  • 2. CHAPTER 5 Security Policies, Standards, Procedures, and Guidelines The four components of security documentation are policies, standards, procedures, and guidelines. Together, these form the complete definition of a mature security program. The Capability Maturity Model (CMM), which measures how robust and repeatable a business process is, is often applied to security programs. The CMM relies heavily on documentation for defining repeatable, optimized processes. As such, any security program considered mature by CMM standards needs to have well-defined policies, procedures, standards, and guidelines. • Policy is a high-level statement of requirements. A security policy is the primary way in which management’s expectations for security are provided to the builders, installers, maintainers, and users of an organization’s information systems. • Standards specify how to configure devices, how to install
  • 3. and configure software, and how to use computer systems and other organizational assets, to be compliant with the intentions of the policy. • Procedures specify the step-by-step instructions to perform various tasks in accordance with policies and standards. • Guidelines are advice about how to achieve the goals of the security policy, but they are suggestions, not rules. They are an important communication tool to let people know how to follow the policy’s guidance. They convey best practices for using technology systems or behaving according to management’s preferences. This chapter covers the basics of what you need to know about policies, standards, procedures, and guidelines, and provides some examples to illustrate the principles. Of these, security policies are the most important within the context of a security program, because they form the basis for the decisions that are made within the security program, and they give the security program its “teeth.” As such, the majority of this chapter is devoted to security policies. There are other books that cover policies in as much detail as you like. See the References section for some recommendations. The end of this chapter provides you with some guidance and examples for standards, procedures, and guidelines, so you can see how they are made, and how they relate to
  • 4. policies. Security Policies A security policy is the essential foundation for an effective and comprehensive security program. A good security policy should be a high-level, brief, formalized statement of the security practices that management expects employees and other stakeholders to follow. A security policy should be concise and easy to understand so that everyone can follow the guidance set forth in it. In its basic form, a security policy is a document that describes an organization’s security requirements. A security policy specifies what should be done, not how; nor does it specify technologies or specific solutions. The security policy defines a specific set of intentions and conditions that will help protect an organization’s assets and its ability to conduct business. It is important to plan an approach to policy development that is consistent, repeatable, and straightforward. A top-down approach to security policy development provides the security practitioner with a roadmap for successful, consistent policy production. The policy developer must take the time to understand the organization’s regulatory
  • 5. landscape, business objectives, and risk management concerns, including the corporation’s general policy statements. As a precursor to policy development, a requirements mapping effort may be required in order to incorporate industry- specific regulation. Chapter 3 covered several of the various regulations as well as best practice frameworks that security policy developers may need to incorporate into their policies. NOTE The regulatory landscape includes U.S. federal and state laws regarding data and personal privacy, European laws restricting what organizations can do with personal data, laws from other countries that must be followed when an organization does business there, and industry-specific standards. All relevant regulations must be incorporated into the policy development objectives. A security policy lays down specific expectations for management, technical staff, and employees. A clear and well-documented security policy will determine what action an organization takes when a security violation is encountered. In the absence of clear policy, organizations put themselves at risk and often flounder in responding to a violation. • For managers, a security policy identifies the expectations of senior management about roles, responsibilities, and actions that should be taken by
  • 6. management with regard to security controls. • For technical staff, a security policy clarifies which security controls should be used on the network, in the physical facilities, and on computer systems. • For all employees, a security policy describes how they should conduct themselves when using the computer systems, e-mail, phones, and voice mail. https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch3.html A security policy is effectively a contract between the business and the users of its information systems. A common approach to ensuring that all parties are aware of the organization’s security policy is to require employees to sign an acknowledgement document. Human Resources should keep a copy of the security policy documentation on file in a place where every employee can easily find it. Security Policy Development When developing a security policy for the first time, one useful approach is to focus on the why, who, where, and what during the policy development process: 1. Why should the policy address these particular concerns? (Purpose)
  • 7. 2. Who should the policy address? (Responsibilities) 3. Where should the policy be applied? (Scope) 4. What should the policy contain? (Content) For each of these components of security policy development, a phased approach is used, as discussed next. NOTE Executive management’s involvement and approval will be required. But initially, the executives may not understand the subject matter. As the policy developer works through the policy development process, gaining executive-level buy-in, feedback, and approval at each stage is useful in garnering support for the security program. This is a good opportunity to correlate executive management’s business requirements and concerns, regulatory requirements, and standards guidance to security policy components. Phased Approach If you approach security policy development in the following phases, depicted in Figure 5-1, the work will be more manageable: https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch5.html#fig5_1 Figure 5-1 Security policy development process 1. Requirements gathering • Regulatory requirements (industry specific) • Advisory requirements (best practices)
  • 8. • Informative requirements (organization specific) 2. Project definition and proposal based on requirements 3. Policy development 4. Review and approval 5. Publication and distribution 6. Ongoing maintenance (and revision) After the security policy is approved, standards and procedures must be developed in order to ensure a smooth implementation. This will require the policy developer to work closely with the technical staff to develop standards and procedures relating to computers, applications, and networks. Security Policy Contributors Security policy should not be developed in a vacuum. A good security policy forms the core of a comprehensive security awareness program for employees, and its development shouldn’t be the sole responsibility of the IT department. Every department that has a stake in the security policy should be involved in its development, not only because this enables them to tailor the policy to their requirements, but also because they will be responsible for enforcing and communicating the policies related to each of their specialties. Different groups and individuals should participate and be represented in order to ensure that everyone is on board, that all are willing to comply, and that the best interests of
  • 9. the entire organization are represented. Figure 5-2 shows some example contributors to the security policy. Figure 5-2 Example of security policy contributors When creating a security policy, the following groups may be represented: • Human Resources The enforcement of the security policy, when it involves employee rewards and punishments, is usually the responsibility of the HR department. HR implements discipline up to and including termination when the organization’s policies are violated. HR also obtains a signature from each employee certifying that they have read and understood the policies of the organization, so there is no question of responsibility when employees don’t comply with the policy. • Legal Often, an organization that has an internal legal department or outside legal representation will want to have those attorneys review and clarify legal points in the document and advise on particular points of appropriateness and applicability, both in the organization’s home country and overseas. All organizations are advised to have some form of legal review and advice on their policies when those policies are applied to individual
  • 10. employees. • Information Technology Security policy tends to focus on computer systems, and specifically on the security controls that are built into the computing infrastructure. IT employees are generally the largest consumers of the policy information. • Physical Security Physical Security (or Facilities) departments usually implement the physical security controls specified in the security policy. In some cases, the IT department may manage the information systems components of physical security. Security Policy Audience https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch5.html#fig5_2 The intended audience for the security policies is all the individuals who handle the organization’s information, such as: • Employees • Contractors and temporary workers • Consultants, system integrators, and service providers • Business partners and third-party vendors • Employees of subsidiaries and affiliates • Customers who use the organization’s information resources Figure 5-3 shows a representation of some example security policy audience
  • 11. members. Figure 5-3 Security policy audience Technology-related security policies generally apply to information resources, including software, web browsers, e-mail, computer systems, workstations, PCs, servers, mobile devices, entities connected on the network, software, data, telephones, voice mail, fax machines, and any other information resources that could be considered valuable to the business. Organizations may also need to implement security policy contractually with business partners and vendors. They may also need to release a security policy statement to customers. Policy Categories Security policies can be subdivided into three primary categories: • Regulatory For audit and compliance purposes, it is useful to include this specific category. The policy is generally populated with a series of legal statements detailing what is required and why it is required. The results of a regulatory requirements assessment can be incorporated into this type of policy. https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch5.html#fig5_3
  • 12. • Advisory This policy type advises all affected parties of business-specific policy and may include policies related to computer systems and networks, personnel, and physical security. This type of policy is generally based on security best practices. • Informative This type of policy exists as a catch-all to ensure that policies not covered under Regulatory and Advisory are accounted for. These policies may apply to specific business units, business partners, vendors, and customers who use the organization’s information systems. The security policy should be concise and easy to read, in order to be effective. An incomprehensible or overly complex policy risks being ignored by its audience and left to gather dust on a shelf, failing to influence current operational efforts. It should be a series of simple, direct statements of senior management’s intentions. The form and organization of security policies can be reflected in an outline format with the following components: • Author The policy writer • Sponsor The Executive champion • Authorizer The Executive signer with ultimate authority • Effective date When the policy is effective; generally when authorized
  • 13. • Review date Subject to agreement by all parties; annually at least • Purpose Why the policy exists; regulatory, advisory, or informative • Scope Who the policy affects and where the policy is applied • Policy What the policy is about • Exceptions Who or what is not covered by the policy • Enforcement How the policy will be enforced, and consequences for not following it • Definitions Terms the reader may need to know • References Links to other related policies and corporate documents Frameworks The topics included in a security policy vary from organization to organization according to regulatory and business requirements. We refer to these topics together as a framework. Organizations may prefer to take a control objective–based approach to creating a security policy framework. For instance, government agencies may take a FISMA-based approach. The Federal Information Security Management Act of 2002 imposes a mandatory set of processes that must follow a combination of Federal Information Processing Standards (FIPS) documents, the NIST Special Publications 800 series, and other legislation pertinent to federal information systems.
  • 14. Policy Categories NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems and Organizations, control objectives are organized into 18 major categories (see NIST in Chapter 3). Control objective subsets exist for each major control category and equal at least 170 control objectives. NIST SP 800-53 is a good starting point for any organization interested in making sure that all the basic control objectives are met regardless of the industry and whether it is regulated. Additional Regulations and Frameworks An organization that must comply with HIPAA (described in Chapter 3) may map NIST SP 800-53 control objectives to the HIPAA Security Rule. HIPAA categorizes security controls (referred to as safeguards) into three major categories: Administrative, Physical, and Technical. As an example, CFR Part 164.312 section (c)(1), which requires protection against improper alteration or destruction of data, is a HIPAA required control that maps to NIST 800-53 System and Information Integrity controls. Some organizations may wish to select a framework based on COBIT (Control Objectives for Information and related Technology). COBIT is an IT governance framework and supporting toolset that allows managers to
  • 15. bridge the gap between control requirements, technical issues, and business risks. Developing policy from a COBIT framework may take considerable collaboration with the Finance and Audit departments. Other organizations may need to combine COBIT with ITIL (IT Infrastructure Library) to ensure that service management objectives are met. ITIL is a cohesive best-practices framework drawn from the public and private sectors internationally. It describes the organization of IT resources to deliver business value, and documents processes, functions, and roles in IT service management. Still other organizations may wish to follow the OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) framework. OCTAVE is a risk- based strategic assessment and planning technique for security from CERT (Carnegie Mellon University). And yet others may need to incorporate the ISO Family (27001 and 27002) from the International Standards Organization. ISO is a framework of standards that provides best practices for information security management. Depending on which regulated industry an organization finds itself in, it is important to take the time to select an appropriate framework and to map out the regulatory and business requirements in the first phase of
  • 16. development. Security Awareness https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch3.html https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch3.html The first line of attack against any organizatio n’s assets is often the trusted internal personnel, the employees that have been granted access to the internal resources. As with most things, the human element is the least predictable and easiest to exploit. Trusted employees are either corrupted or tricked into unintentionally providing valuable information that aids intruders. Because of the high level of trust placed in employees, they are the weakest link in any security chain. Attackers will often “mine” information from employees either by phone, by computer, or in person by gaining information that seems innocuous by itself but provides a more complete picture when pieced together with other fragments of information. Organizations that have a strong network security infrastructure may find their security weakened if the employees are convinced to reduce security levels or reveal sensitive information. One of the most effective strategies to combat this exposure of information by employees is education. When employees understand that they
  • 17. shouldn’t give out private information, and know the reasons why, and know that they will be held accountable, they are less likely to inadvertently aid an attacker in harvesting information. A good security awareness program should include communications and periodic reminders to employees about what they should and should not divulge to outside parties. Training and education help mitigate the threats of social engineering and information leakage. Figure 5-4 depicts some examples of security awareness techniques that can inform different personality types and provide educational opportunities. https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch5.html#fig5_4 Figure 5-4 Ideas to incorporate into a security awareness program Importance of Security Awareness An ongoing security awareness program should be implemented for all employees. Security awareness programs vary in scope and content. See the “References” section of this chapter for pointers to good resources for starting and maintaining a security awareness program. In this section, we will explore some of the basics of how to raise security awareness among employees in
  • 18. organizations. Employees often intentionally or accidentally undermine even the most carefully engineered security infrastructure. That is because they are allowed trusted access to information resources through firewalls, access control devices, buildings, phone systems, and other private resources in order to do their jobs. End users have the system accounts and passwords needed to copy, alter, delete, and print confidential information, change the integrity level of the information, or prevent the information from being available to an authorized user. Propping doors open, giving out their account and password information, and throwing away sensitive papers are common practices in most organizations, and it’s these practices that put the information security program at risk. It’s also these practices that a security awareness program seeks to modify and prevent. In addition to practicing habits that weaken security, employees are also usually the first to notice security incidents. Employees that are well educated in security principles and procedures can quickly control the damage caused by a security breach. A staff that is aware of security concerns can prevent incidents
  • 19. and mitigate damage when incidents do occur. Employees are a useful component of a comprehensive security strategy. Objectives of an Awareness Program The practice of raising the awareness of each individual in the organization is similar to commercial advertising of products. The message must be understood and accepted by each and every person, because every employee is crucial to the success of the security program. One weak link can bring down the entire system. It’s imperative that these objectives be measurable. In a security awareness campaign, the security message is the sales pitch, the product to be sold is the idea of security, and the market is every employee in the organization. Communicating the message is the primary goal, and the information absorbed by the employees is the catalyst for behavioral change. Employees usually know much of what an awareness program conveys. The awareness program reminds them so that secure behaviors are automatic. A plan for an effective security awareness program should include • A statement of measurable goals for the awareness program • Identification and categorization of the audience • Specification of the information to be included in the program • Description of how the employees will benefit from the program Some of this information can be provided by security management (e.g., goals,
  • 20. types of information) and some can be provided by the audience themselves (e.g., demographics, benefits). Surveys and in-person interviews can be utilized to collect some of this information. Identification of specific problems in the organization can provide additional insight. This information is needed to determine how the awareness program will be developed and what form its communication may take. The objectives of a security awareness program really need to be clarified in advance, because presentation is the key to success. A well - organized, clearly defined presentation to the employees will generate more support and less resistance than a poorly developed, random, ineffective attempt at communication. Compliance with this training is often a requirement. Of paramount importance is the need to avoid losing the audience’s interest or attention or alienating the audience by making them feel like culprits or otherwise inadequate to the task of protecting security. The awareness program should be positive, reassuring, and interesting. Just as with any educational program, if the audience is given too much information to absorb all at once, they may become overwhelmed and may lose
  • 21. interest in the awareness program. This would result in a failure of the awareness program, since its goal is to motivate all employees to participate. An awareness program should be a long-term, gradual process. An effective awareness program reinforces desired behaviors and gradually changes undesired behaviors. An awareness program may fail for any of the following reasons: • It is not changed frequently • It does not test whether the learner is understanding the material • It does not test how a user behaves under a given scenario, such as whether the user calls the help desk to report a suspicious event • It does not incentivize the user to participate • It does not include performance evaluations and additional tracking Participation should be consistent and comprehensive, attended and applied by all employees, including contractors and business partners who have access to information systems. New employees should also be folded into the current program. Refresher courses should be given periodically throughout the business year, so attention to the program does not wander, the information stays fresh in the employees’ memories, and changes can be communicated.
  • 22. Management should allow sufficient time for employees to arrange their work schedules so that they can participate in awareness activities. Typically, the security policy requires that employees sign a document stating that they understand the material presented and will comply with security policies. Responsibility for conducting awareness program activities needs to be clearly defined, and those who are responsible must demonstrate that they are performing to expectations. The organization’s training department and security staff may collaborate on the program, or an outside organization or consultant may be hired to perform program activities. Increasing Effectiveness Security awareness programs are meant to change behaviors, habits, and attitudes. To be successful in this, an awareness program must appeal to positive preferences. For example, a person who believes that it is acceptable to share confidential information with a colleague or give their password out to a new employee must be shown that people are respected and recognized in the organization for protecting confidential data rather than for sharing it. The overall message of the program should emphasize factors that appeal to the audience. For example, the damage to a person done when their identity or
  • 23. personal information is stolen may result in a lowering of their credit score or increase in their insurance rates. An awareness program can focus on the victims and the harmful results of incautious activities. People need to be made aware that bad security practices hurt people, whether they intend to or not. The negative effects can be spotlighted to provide motivation, but the primary value of scare tactics is to get the user community to start thinking about security (and their decisions and behaviors) in a way that helps them see how they can protect themselves from danger. Actions that cause inconvenience or require a sacrifice from the audience may not be adopted if the focus is on the difficulty of the actions themselves, rather than the positive effects of the actions. The right message will have a positive spin, encouraging the employees to perform actions that make them heroes, such as the courage and independence it takes to resist appeals from friends and coworkers to share copyrighted software. Withstanding peer pressure to make unethical or risky choices can be shown in a positive light. Specific topics that are contained in most awareness programs include • Privacy of personal, customer, and the organization’s
  • 24. information (including payroll, medical, and personnel records) • The scope of inherent software and hardware vulnerabilities and how the organization manages this risk • Hostile software or malicious code (for example, viruses, worms, Trojans, back doors, and spyware) and how it can damage the network and compromise the privacy of individuals, customers, and the organization • The impact of distributed attacks and distributed denial of service attacks and how to defend against them • The principle of shared risk in networked systems (the risk assumed by one employee is imposed on the entire network) Walt Disney World’s Security Awareness Program: A Case Study At the Computer Security Institute’s (CSI’s) NetSec conference in June 2003, Anne Kuhns of Walt Disney World’s IT division demonstrated some of the best features of Disney’s security awareness program at the time. The program included a self- study module incorporating animated visual activities, clever, eye-catching graphics with friendly characters, and a combination of friendly encouragement and stern correction, all in fun. The module stopped at various checkpoints to ask the employee
  • 25. questions about what they just saw. For example, after describing password policy, it showed four passwords and asked which one complied with the policy. Choosing an incorrect answer earned the employee a stern “No” from the narrator along with an explanation of why the answer was incorrect. A correct answer was required to proceed. Another section included an interactive activity, to maintain attention. A cartoon desk and computer were shown along with some other items. The items were clickable, and the module asked the employee to identify things on the desk that were violations of security policy—such as a mobile device left unattended, a stack of confidential documents in the trash, and a workstation left logged in while nobody is there. Upon clicking these items, the employee was treated to a positive narration along with a description of why those behaviors are undesirable. The consequences were also mentioned, including the personal risk to the employee, which was an effective attention-getter. There was also a game-like objective to the training. At the completion of each section, the employee earned a “key.” After collecting four keys, the employee earned a big fanfare and an electronic certificate. Continued
  • 26. employment depended on the successful completion of the training, but the employee also gained a sense of satisfaction and accomplishment from “winning the game.” Implementing the Awareness Program Once employees understand how to recognize a security problem, they can begin thinking about how they can perform their job functions in compliance with the security policy, and how they should react to security events and incidents. Typical topics for complying with security policy and incident response include • How to report potential security events, including who should be notified and what to do during and after an incident, the timeframe for such reporting, and what to do about unauthorized or suspicious activity. Some situations may require use of verbal communication instead of e-mail, such as when another employee (especially a system administrator) is acting suspicious, when a computer system is under attack, or when e-mail may be intercepted by the intruder. • How to use information technology systems in a secure manner. • How to create and manage passwords, how to safely conduct file transfers and downloads, and how to handle e-mail attachments. The awareness program should emphasize that security is a top
  • 27. priority of management. Security practices should be shown to be the responsibility of everyone in the organization, from executive management down to each employee. Employees will take security practices more seriously when they see that it is important to the organizatio n rather than just another initiative like any other, and when executives lead by example. Codes of ethics or behavior principles can be used to let all employees know exactly what to do and what is expected of them. Employees should also be clear about whom to contact and what to report regarding security incidents. Information should be provided to the employees so that they know whom to contact during an incident. Contact information, such as telephone and pager numbers, e-mail addresses, and web addresses for security staff, the incident response team, and the help desk should be included. Employees should be made aware that time is critical in security compromise situations. They should be informed that immediate reporting of incidents could contain damage, control the extent of the problem, and prevent further damage.
  • 28. Enforcement Enforcement is arguably the most important component of network security. Policies, procedures, and security technologies don’t work if they are ignored or misused. Enforcing the security policy ensures compliance with the principles and practices intended by the architects of the security infrastructure. Security policy enforcement includes a security operations component, which is discussed in more detail in Chapter 31. However, penalties for not following the policy are typically performed by Human Resources, not Security. Security reports violations, and HR enforces. Enforcement takes many forms. For general employees, enforcement provides the assurance that daily work activities comply with the security policy. For system administrators and other privileged staff, enforcement guarantees proper maintenance actions and prevents abuse of the higher level of trust given to this category of personnel. For managers, enforcement prevents overriding of the security practices intended by the framers of the security policy, and it reduces the incidence of conflicts of interest produced when managers give their employees orders that violate policy. For everyone, enforcement dissuades people from casually, intentionally, or accidentally breaking the rules.
  • 29. Negative enforcement usually takes the form of threats to the employee— threats of negative comments on an employee’s review, of a manager’s displeasure, or of termination, for example. For some violations, a progression of corrective actions may be required, eventually culminating in loss of the employee’s job after many repeated violations. For other, more serious breaches of trust, termination may be the first step. Regardless of the severity of the correction, employees should clearly understand what is required of them, and what the process is for punishment when they don’t comply with the rules. In all cases, employees should sign a document indicating their understanding of this process. Positive enforcement is just as important as negative enforcement, if not more so. This may take the form of rewards to employees who follow the rules. These employees are important—they are the ones who keep the business running smoothly within the parameters of the corporate policy. They should be retained https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch31.html and kept motivated to do the right thing. Rewards can range from verbal congratulations to financial incentives and awards for good
  • 30. behavior. Policy Enforcement for Vendors Security enforcement for business partners and other non- corporate entities is the responsibility of the organization’s Board of Directors, which manages relationships with other corporations, makes deals, and signs contracts and statements of intent. These documents should all include security expectations and include signatures of responsible executives. If you want to be able to enforce a particular level of service (defined in the service -level agreement), then you need to define it first. When security policy is violated by partner organizations, the Board of Directors should hold those organizations responsible and take appropriate business measures to correct the problem. This may include financial penalties for underperformance or incentives for overperformance. Policy Enforcement for Employees Enforcement of the corporate security policy for employees and temporary workers is usually the direct responsibility of Human Resources. HR implements punitive actions up to and including termination for serious violations of security policy, and it also attempts to correct behavior with warnings and evaluations. Positive reinforcement can also be enacted by HR, in the form of financial bonuses and other incentives. All employees, without exception, should be held to the same
  • 31. standards of policy enforcement. It is very important not to discriminate or differentiate between employees when enforcing policy. This is especially true of management. Managers, especially senior managers and corporate executives, should be just as accountable as regular employees—perhaps even more so. Senior management should set an example of right behavior for the rest of the organization, and perhaps should be held even to a higher standard than those employees who work for them. When management violates trust or policy, how can employees be expected to adhere to their expectations? By paving the way with high standards of conduct, management helps encourage compliance with the standards of behavior they have set for the employees. Software-Based Enforcement Software can sometimes be used to enforce policy compliance, preventing actions that are not allowed by the policy. One example of this is web browsing controls such as web site blockers. These programs maintain a list of prohibited web sites that is consulted each time an end user attempts to visit a web site. If the attempt is made to go to one of the prohibited sites, the attempt is blocked. Software-based enforcement has the advantage that employees are physically
  • 32. unable to break the rules. Others include Group Policy settings for the operating system. This means that nobody will be able to violate the policy, regardless of how hard they try. Thus, the organization is assured 100 percent policy compliance. Software enforcement is the easiest and most reliable method of ensuring compliance with security policy. There are some disadvantages to software enforcement as well. One disadvantage is that employees who are grossly negligent or willful policy violators (bad seeds) will not be discovered. Some organizations want to weed out these people from their staff, so their employees will consist of mostly honest, hard-working people. With software-based enforcement, it is harder to discover the time wasters, who may find other, less apparent ways of being inefficient. Another disadvantage of automated enforcement is that it may cause disgruntlement and unhappiness among employees who feel that the organization is constraining them, making them conform to a code of behavior with which they do not agree. These employees may feel that “big brother is watching them” and may feel uncomfortable with confining controls. Depending on the corporate culture, this may be a more or less serious problem. Automated enforcement of policy by software can also be
  • 33. circumvented by trusted administrative personnel who have special access to disable, bypass, or modify the security configuration to give themselves special permissions not granted to regular employees. This breach of trust may be difficult to prevent or detect. This is a more general problem that applies to administrative personnel who are responsible for security devices and controls. The best solution is to implement separation of duties, so that violation of trust requires more than one person—two or more trusted employees would have to collude to get around the system. Finally, security policies must be in balance with functional requirements. Regardless of the corporate culture, and how software-based enforcement is used in the organization to control behavior and encourage compliance with the corporate security policy and acceptable use policy, those policies should be well documented and clearly communicated to employees, with signatures by the employees indicating that they understand and agree to the terms. Additionally, software-based enforcement, when used, should be only one step in the chain of enforcement techniques that includes other levels, up to and including termination. Organizations should not rely solely on software for this purpose; they should have clearly defined levels of deterrence that
  • 34. employees understand. In most organizations, employment is an at-will contract between the employer and the employee, and employees should understand that they can lose their job if they try to behave in ways that violate the ethics or principles of the employer. Don’t use software as an excuse or a means of avoiding the difficulties and hardships of enforcement; instead, use it as a tool to accomplish the organization’s enforcement goals. Every industry has different audit requirements and data retention policies based on which standards they adhere to. Some industries are required to have external, independent auditors, while other industries may be fine with internal, in-house audits. Do your due diligence and practice due care by finding out which laws and regulations you are required to be in compliance with. Example Security Policy Topics This section includes sample security policy topics to provide insight into the subjects that might be included in a general security policy for a typical organization. These examples are meant to inspire you to consider which topics might apply to your particular situation and to provide a starting point for thinking about other subjects that might be relevant. Many policy writers are
  • 35. focused on particular subjects, like passwords or network segmentation, and this can make it difficult to think about other topics that should be covered. Referring to this list may help policy writers broaden their focus. This particular set of policy statements is oriented toward a typical small to midsize organization attempting to protect its data resources. Use this as a starting point for elements of your security policy, or compare it with your existing security policy to see whether yours needs additional scope. NOTE The security policy can be divided into sections relating to any reasonable groupings of subjects, such as computers, networks, data, and so on. The following policy examples are organized in conceptual categories, according to their general focus. These categories include acceptable use, computer, network, data privacy, data integrity, personnel management, security management, and physical security policies. These can serve either as topic ideas or as starting points for more comprehensive policy statements. A full policy would contain the information in the following examples along with a statement of purpose (indicating why each policy is required), a scope definition (indicating to whom each policy applies), a stateme nt of monitoring and auditing (indicating
  • 36. how compliance will be measured and assessed), and a statement about enforcement (indicating what can happen if the policy is violated). NOTE The following policy examples are intended to serve as a starting point for your organization. Your requirements will vary. Ideally, the following policy examples will provide you with ideas about topics for your own policy. Acceptable Use Policies Employees may find it helpful to understand exactly how the organization expects them to use computing resources. Every organization has expectations for employee use of computers, but these must be communicated in advance to be effectively enforced. The following is a sample of an acceptable use policy. Notice that the policy is composed of clear, easy-to-read instructions that everyone can understand. 1. PURPOSE 1.1. The organization’s information resources exist in order to support business purposes. Inadvertent or intentional misuse can damage the organization’s business, its customers, vendors, partners, shareholders, and employees. This policy is intended to minimize that damage.
  • 37. 2. SCOPE 2.1. This policy is applicable to all information resources including software, web browsers, email, computer systems, workstations, PCs, servers, mobile devices, entities connected on the network, software, data, telephones, voice mail, fax machines, and any information resources that could be considered valuable to the business, in all locations. 3. RESPONSIBILITIES 3.1. All employees, contractors, consultants, service providers, and temporary workers are responsible for following these practices. 4. ACCEPTABLE USE OF INFORMATION RESOURCES What to do: • Protect the organization’s intellectual property and keep it confidential • Report any unauthorized or inappropriate use, or any security concerns • Follow the guidance in the Information Classification, Labeling, and Handling policy What not to do: • Do not forward, provide access, store, distribute, and/or process confidential information to unauthorized people or places, or post confidential information on Internet bulletin boards, chat rooms, or other electronic forums
  • 38. • Do not access information resources, records, files, information, or any other data when there is no proper, authorized, job-related need • Do not provide false or misleading information to obtain access to information resources • Do not use any account and/or password that has not been assigned to you • Do not perform any conduct which may harm the organization’s reputation • Do not view offensive websites, send or forward offensive email • Do not place personal files on the organization’s computing servers • Do not connect any equipment not owned and managed by the organization to the organization’s network • Do not install personally owned software or non-licensed software on the organization’s computers Personal Use of Information Systems Personal use of the organization’s computer systems is allowed on a limited basis to employees provided that it does not interfere with the organization’s business, expose the organization to liability or damage, compromise the organization’s intellectual property, or violate any laws.
  • 39. Employees should be advised that the organization may at any time be required by law to print or copy files, e-mail, hard copy, or backups and provide this information to government or law enforcement agencies. Internet Usage Monitoring All connections to the Internet must be monitored for the following activities: • Attempts to access restricted web sites • Transfers of very large files • Excessive web browsing • Unauthorized hosting of web servers by employees • Transfers of the organization’s data to or from the Internet Personal Web Sites Employees may not run personal web sites on the organization’s equipment. Ethical Use of the Internet Personal Internet use must conform to the corporate standard of ethics. Non-Corporate Usage Agreement Outside organizations must sign a usage agreement before connecting to the corporate data resources. Employee Usage Agreement All employees must sign a usage agreement. Personal Use of Telephones Corporate phone systems may be used for limited, local, personal calls, as long as this usage does not interfere with the performance of the corporate business. Personal Use of Long-Distance Corporate phone systems may be used for personal domestic long-distance calls, providing that the expense for these calls
  • 40. does not exceed reasonable limits. Computer Policies This group of policies applies to computers and information systems. Authentication policies often form the largest collection of policy statements in a computer environment because authentication systems and variations are so complex and because they tend to have the greatest impact on the average computer user. Password policies are often the largest subset of authentication policies. Account/Password Authentication A unique account and password combination must authenticate all users of information systems. The account name must be used only by a single individual, and the password must be a secret known only to that individual. New Account Requests The manager responsible for a new end user must request access to corporate information systems via a new account. End users may not request their own accounts. The new account request must be recorded and logged for the record. When the account is no longer needed, the account must be disabled. Account Changes The manager responsible for the end user must request changes in access privileges for corporate information systems for a system
  • 41. account. End users may not request access-privilege changes to their own accounts. The request must be recorded and logged for the record. Two-Factor Authentication All administrators of critical information servers must be authenticated via a token card and PIN code. The individual must be uniquely identified based on possession of the token card and knowledge of a secret PIN code known only to the individual user. Desktop Command Access Access to operating system components and system administration commands on end-user workstations or desktop systems is restricted to system support staff only. End users will be granted access only to commands required to perform their job functions. Generic User Accounts Generic system accounts for use by people are prohibited. Each system account must be traceable to a single specific individual who is responsible and accountable for its use. Passwords may not be shared with any other person. Inactive Screen Lock Computer systems that are left unattended must be configured to lock the screen with a password-protected screensaver after a period of inactivity. This screen locking must be configured on each computer system to ensure that unattended computer systems do not become a potential means to gain unauthorized access to the network. Login Message All computer systems that connect to the network must display a
  • 42. message before connecting the user to the network. The intent of the login message is to remind users that information stored on the organization’s information systems belongs to the organization and should not be considered private or personal. The message must also direct users to the corporate information system usage policy for more detailed information. The message must state that by logging on, the user agrees to abide by the terms of the usage policy. Continuing to use the system indicates the user’s agreement to adhere to the policy. Failed Login Account Disabling After ten successive failed login attempts, a system account must be automatically disabled to reduce the risk of unauthorized access. Any legitimate user whose account has been disabled in this manner may have it reactivated by providing both proof of identity and management approval for reactivation. Password Construction Account names must not be used in passwords in any form. Dictionary words and proper names must not be used in passwords in any form. Numbers that are common or unique to the user must not be used in passwords in any form. Passwords shorter than eight characters are not allowed. Password Expiration Passwords may only be used for a
  • 43. maximum of 3 months. Upon the expiration of this period, the system must require the user to change their password. The system authentication software must enforce this policy. Password Privacy Passwords that are written down must be concealed in a way that hides the fact that the written text is a password. When written, the passwords should appear as part of a meaningless or unimportant phrase or message, or be encoded in a phrase or message that means something to the password owner but to nobody else. Passwords sent via e-mail must use the same concealment and encoding as passwords that are written down, and in addition must be encrypted using strong encryption. Password Reset In the event that a new password must be selected to replace an old one outside of the normally scheduled password change period, such as when a user has forgotten their password or when an account has been disabled and is being reactivated, the new password may only be created by the end user, to protect the privacy of the password. Password Reuse When the user changes a password, the last six previously used passwords may not be reused. The system authentication software must enforce this policy. Employee Account Lifetime Permanent employee system accounts will remain valid for a period of 12 months, unless otherwise requested by the employee’s
  • 44. manager. The maximum limit on the requested lifetime of the account is 24 months. After the lifetime of the account has expired, it can be reactivated for the same length of time upon presentation of both proof of identity and management approval for reactivation. Contractor Account Lifetime Contractor system accounts will remain valid for a period of 12 months, unless otherwise requested by the contractor’s manager. The maximum limit on the requested lifetime of the account is 24 months. After the lifetime of the account has expired, it can be reactivated for the same length of time upon presentation of both proof of identity and management approval for reactivation. Business Partner Account Lifetime Business partner system accounts will remain valid for a period of 3 months, unless otherwise requested by the manager responsible for the business relationship with the business partner. The maximum limit on the requested lifetime of the account is 12 months. After the lifetime of the account has expired, it can be reactivated for the same length of time upon presentation of both proof of identity and management approval for reactivation. Same Passwords On separate computer systems, the same password may be
  • 45. used. Any password that is used on more than one system must adhere to the policy on password construction. Generic Application Accounts Generic system accounts for use by applications, databases, or operating systems are allowed when there is a business requirement for software to authenticate with other software. Extra precautions must be taken to protect the password for any generic account. Whenever any person no longer needs to know the password, it must be changed immediately. If the software is no longer in use, the account must be disabled. Inactive Accounts System accounts that have not been used for a period of 90 days will be automatically disabled to reduce the risk of unused accounts being exploited by unauthorized parties. Any legitimate user whose account has been disabled in this manner may have it reactivated by providing both proof of identity and management approval for reactivation. Unattended Session Logoff Login sessions that are left unattended must be automatically logged off after a period of inactivity. This automatic logoff must be configured on each server system to ensure that idle sessions do not become a potential means to gain unauthorized access to the network. User-Constructed Passwords Only the individual owner of each account may create passwords, to help ensure the privacy of each password. No support staff member, colleague, or computer program may generate passwords.
  • 46. User Separation Each individual user must be blocked by the system architecture from accessing other users’ data. This separation must be enforced by all systems that store or access electronic information. Each user must have a well-defined set of information that can be located in a private area of the data storage system. Multiple Simultaneous Logins More than one login session at a time on any server is prohibited, with the exception of support staff. User accounts must be set up to automatically disallow multiple login sessions by default for all users. When exceptions are made for support staff, the accounts must be manually modified to allow multiple sessions. Network Policies This next group of policies applies to the network infrastructure to which computer systems are attached and over which data travels. Policies relating to network traffic between computers can be the most variable of all, because an organization’s network is the most unique component of its computing infrastructure, and because organizations use their networks in different ways. These example policies may or may not apply to your particular network, but they may provide inspiration for policy topics you can consider. Extranet Connection Access Control All extranet connections
  • 47. (connections to and from other organizations’ networks outside of the organization, either originating from the external organization’s remote network into the internal network, or originating from the internal network going out to the external organization’s remote network) must limit external access to only those services authorized for the remote organization. This access control must be enforced by IP address and TCP/UDP port filtering on the network equipment used to establish the connection. System Communication Ports Systems communicating with other systems on the local network must be restricted only to authorized communication ports. Communication ports for services not in use by operational software must be blocked by firewalls or router filters. Inbound Internet Communication Ports Systems communicating from the Internet to internal systems must be restricted to use only authorized communication ports. Firewall filters must block communication ports for services not in use by operational system software. The default must be to block all ports, and to make exceptions to allow specific ports required by system software. Outbound Internet Communication Ports Systems communicating with the Internet must be restricted to use only authorized communication ports. Firewall
  • 48. filters must block communication ports for services not in use by operational system software. The default must be to block all ports, and to make exceptions to allow specific ports required by system software. Unauthorized Internet Access Blocking All users must be automatically blocked from accessing Internet sites identified as inappropriate for the organization’s use. This access restriction must be enforced by automated software that is updated frequently. Extranet Connection Network Segmentation All extranet connections must be limited to separate network segments not directly connected to the corporate network. Virtual Private Network All remote access to the corporate network is to be provided by virtual private network (VPN). Dial-up access into the corporate network is not allowed. Virtual Private Network Authentication All virtual private network connections into the corporate network require token-based or biometric authentication. Home System Connections Employee and contractor home systems may connect to the corporate network via a virtual private network only if they have been installed with a corporate-approved, standard operating system configuration
  • 49. with appropriate security patches as well as corporate-approved personal firewall software or a network firewall device. Data Privacy Policies The topic of data privacy is often controversial and can have significant legal ramifications. Consult a legal adviser before implementing this type of policy. The legal definition of data ownership can be complex depending on how an organization’s computer systems are used and what expectations have been communicated to employees. Copyright Notice All information owned by the organization and considered intellectual property, whether written, printed, or stored as data, must be labeled with a copyright notice. E-Mail Monitoring All e-mail must be monitored for the following activity: • Non-business use • Inflammatory, unethical, or illegal content • Disclosure of the organization’s confidential information • Large file attachments or message sizes Information Classification Information must be classified according to its intended audience and be handled accordingly. Every piece of information must be classified into one of the following categories: • Personal Information not owned by the organization, belonging to private individuals
  • 50. • Public Information intended for distribution to and viewing by the general public • Confidential Information for use by employees, contractors, and business partners only • Proprietary Intellectual property of the organization to be handled only by authorized parties • Secret Information for use only by designated individuals with a need to know Intellectual Property All information owned by the organization is considered intellectual property. As such, it must not be disclosed to unauthorized individuals. The organization’s intellectual property must be protected and kept confidential. Forwarding intellectual property to unauthorized users, providing access to intellectual property to unauthorized users, distributing intellectual property to unauthorized users, storing intellectual property in unauthorized locations, and processing unauthorized intellectual property is prohibited. Any unauthorized or inappropriate use must be reported immediately. Clear Text Passwords Passwords may not be sent in clear text over the Internet or any public or private network either by individuals or by
  • 51. software, nor may they be spoken over public voice networks without the use of encryption. Clear Text E-mail E-mail may be sent in clear text over the Internet, as long as it does not contain secret, proprietary, or confidential corporate information. E- mail containing sensitive or non-public information must be encrypted. Customer Information Sharing Corporate customer information may not be shared with outside organizations or individuals. Employee Information Sharing No employee information may be disclosed to outside agencies or individuals, with the following exceptions: • Date of hire • Length of tenure Employee Communication Monitoring The organization reserves the right to monitor employee communications. Examination of Data on the Organization’s Systems The organization reserves the right to examine all data on its computer systems. Search of Personal Property The organization reserves the right to examine the personal property of its employees and visitors brought onto the organization’s premises. Confidentiality of Non-Corporate Information All customer and business partner information is to be treated as confidential. Encryption of Data Backups All data backups must be encrypted. Encryption of Extranet Connection All extranet connections
  • 52. must use encryption to protect the privacy of the information traversing the network. Shredding of Private Documents Sensitive, confidential, proprietary, and secret paper documents must be shredded when discarded. Destruction of Computer Data Sensitive, confidential, proprietary, and secret computer data must be strongly overwritten when deleted. Cell Phone Privacy Private business information may not be discussed via cell phone, due to the risk and ease of eavesdropping. Confidential Information Monitoring All electronic data entering or leaving the internal network must be monitored for the following: • Confidential information sent via e-mail or file transfer • Confidential information posted to web sites or chat rooms • Disclosure of source code or other intellectual property Unauthorized Data-Access Blocking Each individual user must be blocked by the system architecture from accessing unauthorized corporate data. This separation must be enforced by all systems that store or access electronic information. Corporate information that has been classified as being accessible to a subset of users, but not to all users, must be stored and accessed in such a way that accidental or intentional access by unauthorized parties is not possible. Data Access Access to corporate information, hard copy, and
  • 53. electronic data is restricted to individuals with a need to know for a legitimate business reason. Each individual is granted access only to those corporate information resources required for them to perform their job functions. Server Access Access to operating system components and system administration commands on corporate server systems is restricted to system support staff only. End users will be granted access only to commands required for them to perform their job functions. Highly Protected Networks In networks that have unique security requirements that are more stringent than those for the rest of the corporate network and contain information that is not intended for general consumption by employees and is meant only for a small number of authorized individuals in the organization (such as salary and stock information or credit card information), the data on these networks must be secured from the rest of the network. Encryption must be used to ensure the privacy of communications between the protected network and other networks, and access control must be employed to block unauthorized or accidental attempts to access the protected network from the corporate network. Data Integrity Policies Data integrity policies focus on keeping valuable information intact. It is important to start with definitions of how data integrity may be
  • 54. compromised, such as by viruses, lack of change control, and backup failure. Workstation Antivirus Software All workstations and servers require antivirus software. Virus-Signature Updating Virus signatures must be updated immediately when they are made available from the vendor. Central Virus-Signature Management All virus signatures must be updated (pushed) centrally. E-Mail Virus Blocking All known e-mail virus payloads and executable attachments must be removed automatically at the mail server. E-Mail Subject Blocking Known e-mail subjects related to viruses must be screened at the mail server, and messages with these subjects must be blocked at the mail server. Virus Communications Virus warnings, news, and instructions must be sent periodically to all users to raise end-user awareness of current virus information and falsehoods. Virus Detection, Monitoring, and Blocking All critical servers and end-user systems must be periodically scanned for viruses. The virus scan must identify the following: • E-mail-based viruses arriving on servers and end-user systems • Web-based viruses arriving on servers and end-user systems • E-mail attachments containing suspected virus payloads
  • 55. Notification must be provided to system administration staff and the intended recipient when a virus is detected. All critical servers and end-user systems must be constantly monitored at all times for virus activity. This monitoring must consist of at least the following categories: • E-mail-based viruses passing through mail servers • Web-based viruses passing through web servers • Viruses successfully installed or executed on individual systems Notification must be provided to system administration staff and the intended recipient when a virus is detected. Viruses passing through web proxy servers and e-mail gateways must be blocked in the following manner: • E-mail-based viruses passing through mail servers must have the attachment removed • Web-based viruses passing through web servers must have the attachment removed • Messages with subject lines known to be associated with viruses must not be passed through mail servers, and must instead be discarded Notification must be provided to system administration staff
  • 56. and the intended recipient when a message or web page containing a suspected virus is blocked. Back-out Plan A back-out plan is required for all production changes. Software Testing All software must be tested in a suitable test environment before installation on production systems. Division of Environments The division of environments into Development, Test, Staging, and Production is required for critical systems. Version Zero Software Version zero software (1.0, 2.0, and so on) must be avoided whenever possible to avoid undiscovered bugs. Backup Testing Backups must be periodically tested to ensure their viability. Online Backups For critical servers with unique data, online (disk) backups are required, along with offline (tape) backups. Onsite Backup Storage Backups are to be stored onsite for one month before being sent to an offsite facility. Fireproof Backup Storage Onsite storage of backups must be fireproof. Offsite Backup Storage Backups older than one month must be sent offsite for permanent storage. Quarter-End and Year-End Backups Quarter-end and year-end backups must be done separately from the normal schedule, for accounting purposes. Change Control Board A corporate Change Control Board must be established
  • 57. for the purpose of approving all production changes before they take place. Minor Changes Support staff may make minor changes without review if there is no risk of service outage. Major Changes The Change Control Board must approve major changes to production systems in advance, because they may carry a risk of service outage. Vendor-Supplied Application Patches Vendor-supplied patches for applications must be tested and installed immediately when they are made available. Vendor-Supplied Operating System Patches Vendor-supplied patches for operating systems must be tested and installed immediately when they are made available. Vendor-Supplied Database Patches Vendor-supplied patches for databases must be tested and installed immediately when they are made available. Disaster Recovery A comprehensive disaster-recovery plan must be used to ensure continuity of the corporate business in the event of an outage. System Redundancy All critical systems must be redundant and have automatic failover capability. Network Redundancy All critical networks must be redundant and have automatic failover capability. Personnel Management Policies Personnel management policies describe how people are expected to behave. For each intended audience (management, system administrators,
  • 58. general employees, and so on), the policy addresses specific behaviors that are expected by management with respect to computer technologies and how they are used. NOTE Some policies relate to computers and others relate to people. It can be helpful to separate the two types into different sections, because they may have different audiences. This section includes policies related to people. Many of these policies apply to system administrators, who have elevated levels of privilege that provide fuller access to data and systems than regular employees have. This presents unique challenges and requirements for maintaining the privacy, integrity, and availability of systems to which administrators may have full, unrestricted access. CAUTION Many organizations overlook the special requirements of system administrators in their security policies. Doing so can leave a large vulnerability unchecked, because system administrators have extensive privileges that can produce catastrophic consequences if they are misused or if accidents happen. Application Monitoring All servers containing applications designated for monitoring must be constantly monitored during the hours the
  • 59. application operates. At least the following activities must be monitored: • Application up/down status • Resource usage • Nonstandard behavior of application • Addition or change of the version, or application of software patches • Any other relevant application information Desktop System Administration No user of a workstation or desktop system may be the system administrator for their own system. The root or Administrator password may not be made available to the user. Intrusion-Detection Monitoring All critical servers must be constantly monitored at all times for intrusion detection. This monitoring must cover at least the following categories: • Port scans and attempts to discover active services • Nonstandard application connections • Nonstandard application behavior • Multiple applications • Sequential activation of multiple applications • Multiple failed system login attempts • Any other relevant intrusion-detection information Firewall Monitoring All firewalls must be constantly monitored, 24×7×365, by trained security analysts. This monitoring must include at least the following activities: • Penetration detection (on the firewall)
  • 60. • Attack detection (through the firewall) • Denial of service detection • Virus detection • Attack prediction • Intrusion response Network Security Monitoring All internal and external networks must be constantly monitored, 24×7×365, by trained security analysts. This monitoring must detect at least the following activities: • Unauthorized access attempts on firewalls, systems, and network devices • Port scanning • System intrusion originating from a protected system behind a firewall • System intrusion originating from outside the firewall • Network intrusion • Unauthorized modem dial-in usage • Unauthorized modem dial-out usage • Denial of services • Correlation between events on the internal network and the Internet • Any other relevant security events System Administrator Authorization System administration staff may examine user files, data, and e-mail when required to troubleshoot or solve problems. No private data may be disclosed to any other parties, and if any private passwords are thus identified, this must be disclosed to the account owner so they can be
  • 61. changed immediately. System Administrator Account Monitoring All system administration accounts on critical servers must be constantly monitored at all times. At least the following categories of activities must be monitored: • System administrator account login and logout • Duration of login session • Commands executed during login session • Multiple simultaneous login sessions • Multiple sequential login sessions • Any other relevant account information System Administrator Authentication Two-factor token or biometric authentication is required for all system administrator account access to critical servers. System Administrator Account Login System administration staff must use accounts that are traceable to a single individual. Access to privileged system commands must be provided as follows: • On Unix systems Initial login must be from a standard user account, and root access must be gained via the su command. • On Windows systems System administration must be done from a standard user account that has been set up with Administrator privileges. Direct login to the root or Administrator account is prohibited.
  • 62. System Administrator Disk-Space Usage Monitoring System administration staff may examine user files, data, and e-mail when required to identify disk- space usage for the purposes of disk usage control and storage capacity enhancement and planning. System Administrator Appropriate Use Monitoring System administration staff may examine user files, data, and e-mail when required to investigate appropriate use. Remote Virus-Signature Management All virus software must be set up to support secure remote virus-signature updates, either automatically or manually, to expedite the process of signature file updating and to ensure that the latest signature files are installed on all systems. Remote Server Security Management All critical servers must be set up to support secure remote management from a location different from where the server resides. Log files and other monitored data must be sent to a secure remote system that has been hardened against attack, to reduce the probability of log file tampering. Remote Network Security Monitoring All network devices must be set up to support security management from a location different from where the network equipment resides. Log files and other monitored data must be sent to a secure remote system that has been hardened against attack, to reduce the probability of
  • 63. log file tampering. Remote Firewall Management All firewalls must be set up to support secure remote management from a location different from where the firewall resides. Log files and other monitored data must be sent to a secure remote system that has been hardened against attack, to reduce the probability of log file tampering. Security Management Policies Managers have responsibilities for security just as employees do. Detailing expectations for managers is crucial to ensure compliance with senior management’s expectations. Employee Nondisclosure Agreements All employees must sign a nondisclosure agreement that specifies the types of information they are prohibited from revealing outside the organization. The agreement must be signed before the employee is allowed to handle any private information belonging to the organization. Employees must be made aware of the consequences of violating the agreement, and signing the agreement must be a condition of employment, such that the organization may not employ anyone who fails to sign the agreement. Nondisclosure Agreements All business partners wishing to do business with the organization must sign a nondisclosure agreement that specifies the types of
  • 64. information they are prohibited from revealing outside the organization. The agreement must be signed before the business partner is allowed to view, copy, or handle any private information belonging to the organization. System Activity Monitoring All internal information system servers must be constantly monitored, 24×7×365, by trained security analysts. At least the following activities must be monitored: • Unauthorized access attempts • Root or Administrator account usage • Nonstandard behavior of services • Addition of modems and peripherals to systems • Any other relevant security events Software Installation Monitoring All software installed on all servers and end- user systems must be inventoried periodically. The inventory must contain the following information: • The name of each software package installed on each system • The software version • The licensing status System Vulnerability Scanning All servers and end-user systems must be periodically scanned for known vulnerabilities. The vulnerability scan must identify the following: • Services and applications running on the system that could be exploited to
  • 65. compromise security • File permissions that could grant unauthorized access to files • Weak passwords that could be easily guessed by people or software Security Document Lifecycle All security documents, including the corporate security policy, must be regularly updated and changed as necessary to keep up with changes in the infrastructure and in the industry. Security Audits Periodic security audits must be performed to compare existing practices against the security policy. Penetration Testing Penetration testing must be performed on a regular basis to test the effectiveness of information system security. Security Drills Regular “fire drills” (simulated security breaches, without advance warning) must take place to test the effectiveness of security measures. Extranet Connection Approval All extranet connections require management approval before implementation. Non-Employee Access to Corporate Information Non-employees (such as spouses) are not allowed to access the organization’s information resources. New Employee Access Approval Manager approval is required for new employee access requests. Employee Access Change Approval Manager approval is required for employee
  • 66. access change requests. Contractor Access Approval Manager approval is required for contractor access requests. Employee Responsibilities The following categories of responsibilities are defined for corporate employees. These categories consist of groupings of responsibilities that require differing levels of access to computer systems and networks. They are used to limit access to computers and networks based on job requirements, to implement the principles of least privilege and separation of duties. • General User • Operator • System Administrator • Customer Support Staff • Customer Engineer • Management Security Personnel Responsibilities The following categories of responsibilities are defined for security personnel. These categories consist of groupings of responsibilities within the security organization that require differing levels of access to security information and systems based on job function, in order to implement the principles of least privilege and separation of duties. • Security Architect • Facility Security Officer
  • 67. • Security Manager • Technical Security Administrator Employee Responsibility for Security All corporate employees are responsible for the security of the computer systems they use and the physical environment around them. Sensitive HR Information Sensitive HR information (such as salaries and employee records) must be separated and protected from the rest of the corporate network. Security Policy Enforcement Enforcement of this corporate security policy is the responsibility of the corporate Human Resources department. HR New Hire Reporting HR must report required information about new hires to system administrators one week in advance of the new employee’s start date. HR Termination Reporting HR must report required information about terminations to system administrators one week before the termination date, if possible, and no later than the day of termination. Contractor Information Reporting HR is responsible for managing contractor information and providing this information to system administrators. Background Checks HR must perform background checks on new employee applicants. Reference Checks HR must perform reference checks on new
  • 68. employee applicants. Physical Security Policies In the context of computer systems, physical security policies describe how computer hardware and direct access is managed. Because the computer systems reside in a building, and that building may be used for other purposes as well, there may be some overlap and potential conflicts of interest with the other purposes of the building. These must be addressed and resolved in order to properly protect the computers and the people who use them. CAUTION Physical security is often the responsibility of a department other than Information Technologies (often Facilities, for example). However, many of the requirements for physical network security overlap with the general requirements for corporate physical security. An effective physical network security policy is developed in tandem with the organization responsible for general physical security. Building and Campus Security Building and campus security policies describe what people are expected to do on the organization’s property. These are physical security policies, and they often fall outside the domain of information technology. Room Access Based on Job Function Room access must be restricted based on employee job function. Physical Security for Laptops All laptops must be locked to a
  • 69. sturdy fixture using a cable when not in transit. Position of Computer Monitors Computer monitors must be faced away from windows to discourage “eavesdropping.” Badges on the Organization’s Premises All corporate employees on the production premises must display badges with picture identification in plain view. Temporary Badges Temporary badges may be provided to employees who have lost or forgotten their badges. Guards for Private Areas Guards or receptionists must be located in areas containing sensitive information. Badge Checking Guards or receptionists must ask to see badges for all people attempting to access the building. Tailgating Tailgating or piggybacking (following a person into a building) is prohibited, and allowing any person to tailgate or piggyback is prohibited. Employee Responsibility for Security Employees are responsible for the security of the servers at all facilities, and for the actions of their coworkers. Security Policy Enforcement Enforcement of this physical security policy is the responsibility of HR. Data Center Security Data center policies describe how computer equipment and data is protected in
  • 70. the physical facilities in which the computer and network equipment resides. This protection is very important, because unauthorized physical access can be the most direct route to compromising a computer system. Physical Security for Critical Systems All critical equipment must be kept in locked rooms. Security Zones Within the production equipment area of the production facility, equipment is separated into two physical spaces with differing access requirements: • Standard General production servers with standard sensitivity • Highly secure Production servers with higher security requirements Non-Employee Access to Corporate Systems Non-employees (such as contractors) are not allowed physical access to the organization’s information resources. Asset Tags All equipment in the production facility must carry an asset tag bearing a unique identifier. Equipment Entrance Pass All equipment entering the production facility must be recorded in a log that contains at least the following information: • Employee name • Date and time • Type of equipment • Asset tag • Corporate employee signature
  • 71. • Production employee signature Equipment Exit Pass All equipment leaving the production facility must be recorded in a log that contains at least the following information: • Employee name • Date and time • Type of equipment • Asset tag • Corporate employee signature • Production employee signature Access Authorization Employees must be authorized in advance by a corporate manager of director-level or higher status before attempting to gain access to the production equipment facility. In general, this authorization must come from the Director of Operations or their designated backup. Access from Inside Employees already inside the production equipment area may not open the door to allow access to anyone else from outside the area. This access must be provided through the production staff escort. Employee Access Lifetime Access accounts for all employees will remain valid for a period of 12 months, unless otherwise requested by the employee’s manager. The maximum limit on the requested lifetime of the account is 24 months. After the lifetime of the account has expired, it can be reactivated for the
  • 72. same length of time upon presentation of both proof of identity and management approval for reactivation. Inactive Access Badges Access accounts that have not been used for a period of 90 days will be automatically disabled, to reduce the risk of unused accounts being exploited by unauthorized parties. Any legitimate user whose account has been disabled in this manner may have it reactivated by providing both proof of identity and management approval for reactivation. New Access Requests The manager responsible for a new employee or an employee who has not previously had access must request access to the production facility for that employee. Employees may not request their own accounts. The new access request must be recorded and logged for the record. When the access is no longer needed, the account must be disabled. Production Staff Access Production staff may only enter the secure area when explicitly requested by a corporate employee, and only after confirming the request with the designated corporate director-level contact. Access Monitoring All access to the production facility must be constantly monitored during all hours of the day, 24×7×365. This monitoring must consist of at least the following: • Camera recording of the production area • Video screen monitoring by production staff • Video tape recording
  • 73. Access via Secure Area Access to the highly secure area is provided via the secure area. Thus, all security requirements pertaining to the secure area are prerequisites for access to the highly secure area. Buddy System A minimum of two employees is required for access to the highly secure production equipment facility. Unaccompanied access to the highly secure production facility is prohibited. Three-Badge Access Requirement Access to the highly secure equipment room from the outside requires both a corporate employee and a production facility employee. Once access is granted, the corporate employees may remain in the production room without production employee escort. Biometric Authentication All employees requiring access to the highly secure facility must be authenticated via a biometric device that uniquely identifies the individual based on some personal biological characteristic. Production Staff Access Production staff may not enter the highly secure area under any circumstances. Room Access Based on Job Function Room access to the secure and the highly secure areas must be restricted based on employee job function. Health and Safety The health and safety of people is of paramount importance. There is no higher priority for any organization. All other policies are secondary
  • 74. and must not infringe on the safety of individuals during a crisis or during normal operations. Policies designed to protect the lives of people vary widely—a few are listed here as examples, but these are unique to each situation. Search of Personal Property The production facility must examine any bags or personal carrying items larger than a purse or handbag. Tailgating Tailgating or piggybacking (following a person into a building) is prohibited, and allowing any person to tailgate or piggyback is prohibited. Security Drills Regular security drills (simulated security breaches without advance warning) must take place to test the effectiveness of security measures. These drills can take the form of unauthorized access attempts, equipment entrance or removal, or any other appropriate test of production facility security measures. Security Standards A standard is somewhat more detailed than a policy. Standards describe how to comply with the policy, and because they are associated with policies, they should be considered mandatory. Standards are the extension of the policy into the real world—they specify technology settings, platforms, or behaviors. Security managers responsible for IT infrastructure will usually spend more time writing standards than they spend on policy.
  • 75. Much of the information contained in Chapter 21 and 22 of this book pertains to settings for Unix and Windows systems. Those settings would typically be the level of detail that is included in standards. Compare the information in those chapters against the set of policy statements listed in the previous section of this chapter. You’ll see that policy statements are simple, direct, and somewhat https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch21.html https://learning.oreilly.com/library/view/information-security- the/9780071784351/ch22.html general. Standards interpret the policy to the level of specifics needed by a subject matter expert. Security Standard Example The following is a sample of a security standard. This is part of a standard for securing Linux servers. It is intended to establish a baseline set of configurations that would establish common settings across all Linux platforms on the network. Notice that the level of detail is very deep—only an experienced system administrator would be able to understand some of these instructions. That is typical of a standard, as opposed to a policy, which everyone should be able to understand regardless of their level of expertise. 1. PURPOSE
  • 76. 1.1. The purpose of this standard is to define the software and hardware configurations required to secure Linux servers. It defines security settings for operating system and software that are required by policy. 2. SCOPE 2.1. This standard is to be used by system administrators responsible for administration of computers using the Red Hat Enterprise Linux operating system. 3. RESPONSIBILITIES 3.1. The Security Manager is responsible for defining this standard. 3.2. The Server team is responsible for following this standard. 4. STANDARD 4.1. SERVICES 4.1.1. Specific services that are required for general operation of the systems and resident vendor applications services are to be reviewed for security risks and approved by the Security Manager. 4.1.2. Services that are not needed are to be disabled during boot. 4.2. INITIAL PASSWORD AND LOGIN SETTINGS 4.2.1. All accounts for system administrators are to be added as local accounts in the /etc/passwd and /etc/shadow files. NIS is not to be used for password verification. 4.2.2. Privileged user accounts require IT system operations and applications manager approval before being placed on system.
  • 77. 4.2.3. No developer accounts are allowed on production servers. 4.2.4. All administration user accounts are to be set with 90 day password aging, 7 day notification of password expiration, and 7 day passw ord minimum. 4.2.5. All root and application administrator accounts are to be reviewed and will have a scheduled password change by operations administrators once every 90 days. 4.2.6. The default login setting is to be set to lock out the session after 3 failed password login attempts. 4.2.7. Default password settings must enforce a minimum of 8 characters. 4.2.8. The ability to log in directly over the network to the root account must be disabled. 4.3. SENDMAIL 4.3.1. The sendmail service is to be disabled on all non-mail servers unless required by an application running on the system. Applications requiring Sendmail services must first be approved by IT system operations manager. 4.4. BANNER/NOTICE 4.4.1. Configure the login banner with the standard warning notice. 4.5. LOGGING 4.5.1. Turn on logging for Internet standard services. 4.5.2. Turn on logging for LOG_AUTHPRIV facility. 4.5.3. Log connection tracing to inetd/xinetd and messages sent to AUTH facility.
  • 78. 4.5.4. Set logging for sudo activities. 4.5.5. Send all kernel authorization, debug, and daemon notices to a syslog server for monitoring, reviewing, and archiving. Security Procedures Procedures are step-by-step instructions to perform a specific task. Security Procedure Example In this example, notice that the level of detail is more specific than that found in both policies and standards. The procedure is a set of instructions that a system administrator would perform when sitting at the keyboard of the computer being built. Most people will not understand this information—it is very specialized, and intended only for someone who is a system administrator. The type of specialized information found in a security procedure is usually very job-specific. 1. PURPOSE 1.1. This procedure is intended for the security installation of Apache web servers. It defines the steps necessary to ensure a secure installation that complies with security policy. 2. SCOPE 2.1. This procedure is to be used by system administrator s responsible for installing the Apache HTTP server. 3. RESPONSIBILITIES 3.1. The Security Manager is responsible for defining this
  • 79. procedure. 3.2. Any system administrator installing Apache HTTP server on the network is responsible for following this procedure. 4. APACHE WEB SERVER SECURITY PROCEDURE 4.1. Compile and install the server software as follows: 4.1.1. ./configure --prefix=/usr/local/apache --disable- module=all --server- uid=apache --server-gid=apache --enable-module=access -- enable- module=log_config --enable-module=dir --enable-module=mime --enable- module=auth 4.1.2. make 4.1.3. su 4.1.4. umask 022 4.1.5. make install 4.1.6. chown -R root:sys /usr/local/apache 4.2. The next step is to limit Apache processes’ access to the filesystems. Start this process by creating a new root directory structure under the /chroot/httpd directory: 4.2.1. mkdir -p /chroot/httpd/dev 4.2.2. mkdir -p /chroot/httpd/etc 4.2.3. mkdir -p /chroot/httpd/var/run 4.2.4. mkdir -p /chroot/httpd/usr/lib 4.2.5. mkdir -p /chroot/httpd/usr/libexec 4.2.6. mkdir -p /chroot/httpd/usr/local/apache/bin 4.2.7. mkdir -p /chroot/httpd/usr/local/apache/logs 4.2.8. mkdir -p /chroot/httpd/usr/local/apache/conf 4.2.9. mkdir -p /chroot/httpd/www 4.3. Next, create the special device file: /dev/null:
  • 80. 4.3.1. ls -al /dev/null 4.3.2. crw-rw-rw- 1 root wheel 2, 2 Mar 14 12:53 /dev/null 4.3.3. mknod /chroot/httpd/dev/null c 2 2 4.3.4. chown root:sys /chroot/httpd/dev/null 4.3.5. chmod 666 /chroot/httpd/dev/null 4.4. Add the following line to the /etc/rc.conf file: 4.4.1. syslogd_flags=“-l /chroot/httpd/dev/log” 4.5. Restart the system. 4.6. Copy the main httpd program into the new directory tree with all necessary binaries and libraries, as follows: 4.6.1. localhost# ldd /usr/local/apache/bin/httpd 4.7. Copy the files to the new root directory structure: 4.7.1. cp /usr/local/apache/bin/httpd /chroot/httpd/usr/local/apache/bin/ 4.7.2. cp /var/run/ld-elf.so.hints /chroot/httpd/var/run/ 4.7.3. cp /usr/lib/libcrypt.so.2 /chroot/httpd/usr/lib/ 4.7.4. cp /usr/lib/libc.so.4 /chroot/httpd/usr/lib/ 4.7.5. cp /usr/libexec/ld-elf.so.1 /chroot/httpd/usr/libexec/ Security Guidelines Guidelines give advice. They are not mandatory—they are just suggestions on how to follow the policy. Guidelines are meant to make life easier for the end user, as well as for the security manager who wrote the policy, because they help people understand how to meet the goals set by the security policy. Security Guideline Example In this example, the password complexity rules of the password policy are translated into a set of easy-to-follow suggestions. There may
  • 81. be other ways to select a password to be compliant with the policy, but these guidelines are intended to simplify the process for the end users while at the same time allowing them to make strong passwords. Notice that unlike standards and procedures, the material is easy for everyone to read and understand. 1. PURPOSE 1.1. These guidelines are meant to give you some ideas about how to create a good password. Our password policy requires a certain amount of complexity, which can result in difficult-to-remember passwords, but these guidelines should help you comply with our password policy while at the same time making it easier for you to choose a memorable password. 2. SCOPE 2.1. These guidelines are for all people who have computer accounts on our network. 3. RESPONSIBILITIES 3.1. The Security Manager is responsible for defining, maintaining, and publishing these guidelines. 4. PASSWORD SELECTION GUIDELINES 4.1. Do: 4.1.1. Use as many different characters as possible including numbers, punctuation characters, and mixed upper- and lowercase letters. Choosing
  • 82. characters from the largest possible range will make your password more secure. 4.1.2. Use both upper- and lowercase letters. 4.1.3. Use at least one number and one punctuation mark. 4.1.4. Select passwords that are easy to remember, so they do not have to be written down. 4.2. Don’t use any of the following easily guessed items in your password: 4.2.1. Your name, the names of any family or friends, names of fictional characters 4.2.2. Phone number, license or social security numbers 4.2.3. Any date 4.2.4. Any word in the dictionary 4.2.5. Passwords of all the same letter or any variation on the word “password” 4.2.6. Simple patterns on the keyboard, like qwerty 4.2.7. Any word spelled backwards 4.3. Suggestions: 4.3.1. Use the first one or two letters of each word in a phrase , song, or poem you can easily remember. Add a punctuation mark and a number. 4.3.2. Or, use intentionally misspelled words with a number or punctuation mark in the middle. 4.3.3. You can also alternate between one consonant and one or two vowels, and include a number and a punctuation mark. This provides a pronounceable nonsense word that you can remember. 4.3.4. Or you can choose two short words and concatenate them together with a
  • 83. punctuation character between them, 4.3.5. Or, interlace two words or a word and a number (like a year) by alternating characters. Ongoing Maintenance The security policies, standards, procedures, and guidelines are living documents. That means they are not written once and left unchanged for years. These documents should be regularly updated in response to changing business conditions, technologies, customer requirements, and so on. Some form of document version control technology may be helpful in managing this lifecycle process. In order to communicate the security documents, it is best to keep them online or in a place where the various audiences will be able to review and understand changes as they are approved and implemented. Some organizations use an intranet web site to present their security docume nts, so employees can easily reference them throughout the workday. Once the security policies, standards, procedures, and guidelines are in place, well established, and in a position to dictate daily operations, an audit may be performed by outside agencies or internal departments. An audit compares existing practices to the intentions of the policy. Having an unbiased third-party
  • 84. perspective can be helpful in isolating weaknesses or problems with the policy and its enforcement—this requires a disinterested party (not the security organization or the IT department) to perform the audit. Audits can be performed as often as needed—monthly, quarterly, yearly, or at some other interval. Security policy compliance should be audited at least once a year, because longer periods may allow for substantial deviation between the policy and the operations. Summary This chapter is about how to develop security policies and their associated standards, procedures, and guidelines to help people comply. A security policy forms the foundation for a productive security program. It is a statement about how to protect an organization. It describes an organization’s security controls, without specifying technologies, providing guidance to the people building, installing, and maintaining computer systems so that they don’t have to make decisions by themselves that may conflict with the intentions of the organization’s senior management. Security policies should tell their audience what must be done, not how these things should be done. A security policy
  • 85. specifies what should be done, not how; nor does it specify technologies or specific solutions. A security policy should be in written form. It provides instructions to employees about what kinds of behavior or resource usage are required and acceptable, and about what is forbidden and unacceptable. A good security policy forms the core of a comprehensive security effort, and it is rarely just the responsibility of Information Technology departments. Every department that has a stake in the security policy should be involved in its development. The approach to security policy development provided in this chapter directs the reader to understand the regulatory and business requirements first, select an appropriate framework or approach, and follow a phased approach to security policy development. References Barman, Scott. Writing Information Security Policies. New Riders Publishing, 2001. Desman, Mark B. Building an Information Security Awareness Program. Auerbach Publishing, 2001. Dijker, Barbara L., ed. A Guide to Developing Computer Policy Documents. Usenix Associates, 1996. Greene, Sari. Security Policies and Procedures: Principles and Practices. Prentice
  • 86. Hall, 2005. Herold, Rebecca. Managing an Information Security and Privacy Awareness and Training Program. 2nd ed. CRC Press, 2010. National Institute of Standards and Technology. NIST Special Publication 800-50: Building an Information Technology Security Awareness and Training Program. NIST, 2003. http://csrc.nist.gov/publications/nistpubs/800- 50/NIST-SP800-50.pdf http://csrc.nist.gov/publications/nistpubs/800-50/NIST-SP800- 50.pdf National Institute of Standards and Technology. NIST Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations. NIST, 2012. http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-53- Rev.%204 Peltier, Thomas R. Information Security Policies and Procedures: A Practitioner’s Reference. Auerbach Publications, 2004. Peltier, Thomas R. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. Auerbach Publications, 2001. Wood, Charles C. Information Security Policies Made Easy. Version 10. Baseline Software, 2008. http://csrc.nist.gov/publications/PubsDrafts.html#SP-800-53-
  • 87. Rev.%204 CHAPTER 6 Security Policies, Standards, Procedures, and Guidelines Information security is no longer simply about patch management and firewalls. It requires a holistic risk management approach. As organizations increasingly rely on global networks for supply chain and communications, and amass distributed data in terabyte amounts, it has become apparent that the old models for computer security are no longer effective. The exploitation points have correspondingly increased exponentially. The old model of hiring a couple of security analysts or engineers and throwing them into the Information Technology department is no longer sufficient to address the growing needs of data and communications protection. Security can no longer be left in the hands of the technologists. It must be acknowledged, considered, embraced, and championed at the highest levels of the organization. In other words, it must be aligned to the business objectives of the organization to
  • 88. maintain or improve its value. What is now required is a risk management approach to security that addresses the organization as a whole. Risk management cannot be conducted in a silo. It requires a coordinated and collaborative approach throughout the organization and must be lifecycle oriented. It is not enough to form a “security department” by putting somebody in charge, hiring a few security technologists, and calling it a day. Security risk management must now evolve into a highly defined, quantifiable, justifiable approach to securing the organization’s assets and reputation against loss. That “ultimate responsibility” lands on the shoulders of top executives. So why the change? Now that the Information Age has permeated all aspects of the business world, the business environment and the information that drives it have become increasingly dynamic. The information landscape changes daily, and organizations need to adapt to that change to protect their assets—in other words, manage their risk. Roles and Responsibilities At the executive level, there must be overall and/or ultimate
  • 89. responsibility (or accountability, if you prefer) for risk management. The size of the risk management organization headed by that executive will vary based on the size of the business. Large organizations may have all the roles that are defined in this chapter, whereas smaller organizations may employ a security organization that consists of a few individuals (who may also share other responsibilities, as long as those responsibilities don’t conflict with their security roles). Midsize organizations need several security positions ranging from the technical security administrators who configure firewalls, routers, antivirus software, and the like, to security engineers who design security controls, managed by a security manager, director, or senior executive. Large organizations need a complete security organization. All organizations, large or small, need an executive decision maker who has been designated as being responsible for security risk. In addition, the distinctions between large and small organizations and what security positions they require vary according to what the organization does. Financial companies typically require a larger and more robust security organization due to the capital financial
  • 90. risk involved in an event or incident that negatively impacts their integrity, confidentiality, and availability. Healthcare organizations, along with businesses in other highly regulated sectors such as publicly traded companies that must comply with Sarbanes-Oxley rules, and financial companies that are regulated by the Gramm-Leach-Bliley Act, also require a substantial security organization. Technology companies may require a midsize or smaller security organization, depending on how exposed they are to threats, vulnerabilities, and risks from an attack and how much their security posture is improved by aligning security to business objectives. Every organization is different. Oracle’s Chief Security Officer: A Case Study As Oracle’s Chief Security Officer (CSO), Mary Ann Davidson has responsibility for product security as well as security policies, the security of infrastructure, security evaluations and assessments, and incident handling. Oracle was one of the first companies to establish a CSO position, along with a Chief Privacy Officer (CPO). While their offices operate
  • 91. independently, these senior executives coordinate their efforts on security and privacy issues. Davidson maintains that software manufacturers should design and build their applications securely. To do this, she proposes the following: • Develop a core group of security experts to inject security into application design • Centralize common security functions to work together • Develop secure coding practices to avoid common vulnerabilities • Conduct regression testing to ensure that new versions of software don’t invalidate previous security controls • Submit to independent product assessments and security evaluations such as the Common Criteria testing program sponsored by the National Institute of Standards (NIST) and the National Security Agency (NSA) The ability to influence corporate culture at this level demonstrates the effectiveness and value of an officer-level security position. Security Positions
  • 92. The following positions are recommended for security organizations. Other positions also exist outside the formal security organization, because everyone in the business has some level of responsibility for security. For example, every employee is responsible for protecting their passwords, their login sessions, and any confidential information they handle. General managers, department heads, and operational leads are responsible for being familiar with security policy and keeping an eye on the security practices of their subordinates. They are responsible for ensuring that violations are reported, and may carry out enforcement policies. Figure 6-1 shows an example security responsibility hierarchy, with some descriptions of responsibilities that might pertain to each position. Figure 6-1 Example security organization Chief Security Risk Officer (CSRO) or Chief Information Security Officer (CISO) This position is an executive staff member, with ultimate accountability for all security efforts for the
  • 93. business. The CSRO oversees all aspects of risk management across the enterprise, or in organizations without a formal risk management department, the CISO oversees the information security function and incorporates risk management into that function. In organizations where the CSRO is responsible for all types of risks across the business (including financial risks, business risks, and other non-IT risks), the person in that role will generally establish an IT risk function to oversee IT-related risks in particular, since the management of IT risks represents a unique discipline requiring specialized knowledge. Otherwise, the CISO performs that role. The CSRO or CISO should report to the chief executive officer (CEO), chief operating officer (COO), or the Board of Directors. While some organizations may consider it controversial to elevate the position to equal par with chief executives, the criticality of addressing corporate risk and legal compliance justifies the decision. The CSRO or CISO is a champion and defender of security and risk initiatives for the business, bearing overall responsibility for risk assessment and risk management. The CRSO or CISO may hold certifications related to information security, audit, risk
  • 94. management, and disaster recovery. In collaboration with the executive staff, the CSRO or CISO should: • Ensure the business has risk management skills in its human capital • Establish an organizational structure that supports a risk management strategy • Implement an integrated risk management framework • Define the business’ risk appetite in terms of loss tolerance • Ensure the business can absorb the risk in terms of human and financial resources • Establish risk assessment, management, response, mitigation, and audit procedures • Influence the business’ risk culture and provide organizational learning opportunities Security Director The security director works with the executive team to accomplish business goals. This position requires expert communication, negotiation, and leadership skills, as well as technical knowledge of IT and security hardware. While a person who has experience as a vice president may already possess these
  • 95. skills, the focus of the security director should be security- oriented and they should be experienced in information security decision making. The security director has responsibility to oversee and coordinate security efforts across the business, including IT, HR, Communications, Legal, Facilities, and other departments, to identify needed security initiatives and standards. The security director, among other responsibilities: • Coordinates the security-related strategic and visionary goals of the business • Oversees security management and vendors who safeguard the business’ assets, intellectual property, and computer systems, as well as the physical safety of employees and visitors • Identifies protection goals and objectives consistent with corporate strategic plans • Manages the development and implementation of global security policy (rules), standards (minimum requirements), guidelines (recommendations), and procedures (step-by-step instructions) to ensure ongoing maintenance of security
  • 96. • Maintains relationships with local, state, and federal law enforcement and other related government agencies • Oversees the investigation of security breaches and assists with disciplinary and legal matters associated with such breaches as necessary • Works with outside consultants as appropriate for independent security audits • Participates in the business’ change management process at the organizational and strategic level • Is fluent with the various aspects of the risk management framework Security Manager The security manager has day-to-day responsibility for all security-related activities and incidents. All operational security positions report to this position. The security manager is responsible for management and distribution of the security policy, policy adherence and coordination, and security incident coordination. The security manager also assigns and determines ownership of data and information systems. In addition, this person also ensures that audits take place to
  • 97. determine compliance with policy. The security manager also makes sure that all levels of management and administrative and technical staff participate during planning, development, and implementation of policies and procedures. Many of the security manager’s functions can be delegated, depending on the staffing requirements and individual skill sets of the security organization. However, the security manager bears accountability for ensuring that these functions take place effectively. Certifications that a security manager may hold include Information Assurance Manager (IAM) or equivalent and Certified Information Security Manager (CISM) from ISACA. In addition to other roles, the security manager: • Develops and maintains a comprehensive security program • Develops and maintains a business resumption plan for information resources • Approves access and formally assigns custody of the information resources • Ensures compliance with security controls • Plans for contingencies and disaster recovery
  • 98. • Ensures that adequate technical support is provided to define and select cost-effective security controls Security Architect This person has ultimate responsibility for the security architecture, including conducting product testing and keeping track of new bugs and security vulnerabilities as they arise. The security architect produces a detailed security architecture for the network based on identified requirements and uses this architecture specification to drive efforts toward implementation. In addition to other roles, the security architect: • Identifies threats and vulnerabilities • Identifies risks to information resources through risk analysis • Identifies critical and sensitive information resources • Works with the data owner to assess and classify information • Works with technical management to specify cost-effective security controls and convey security control requirements to users and custodians
  • 99. • Assists the security manager in evaluating the cost- effectiveness of controls Security Engineer The primary role of this position is the technical implementation of the architect’s designs. The security engineer works directly with the architect on design decisions and with the administrator on device management decisions. Security engineers generally have a degree in engineering or computer science, along with extensive technical training or experience, and they often hold Certified Information Systems Security Professional (CISSP) certification and other technical certifications in their field of expertise. A security engineer may perform the following duties: • Installation and configuration of networks and network devices such as web application firewalls, network firewalls, switches, load balancers, and routers • Security configuration of Unix, Linux, or Windows servers • Security configuration of applications and databases • Installation, configuration, and design of security tools, including development and coding • Security incident investigation, including network packet capture
  • 100. • Maintenance and monitoring of network and host intrusion detection and prevention technologies Security Administrator Every security organization has security administrators, as many as needed to implement security on a day-to-day, operational/tactical basis at the facility. The security administrator executes all actions directed by the security architect, security engineer, security manager, or as required by security policy or incident response procedures. The security administrator is responsible for ensuring all appropriate security requirements are met and maintained on all computers, networks, and network technologies, including patch management and operating system upgrades. The security administrator is often the first person contacted whenever there is a suspected or known security problem. This person has the operational/tactical responsibility for ensuring that the business, its reputation, and its assets are protected and has the authority to take any and all action necessary to accomplish this goal.
  • 101. Among other duties, the security administrator: • Implements the security controls specified by the security architect, security engineer, and security manager • Implements physical and procedural safeguards for information resources within the facility • Administers access to the information resources and makes provisions for timely detection, reporting, and analysis of actual and attempted unauthorized access to information resources • Provides assistance to the individuals responsible for information security • Assists with acquisition of security hardware/software • Assists with identification of vulnerabilities and other data gathering activities and log file analysis • Develops and maintains access control rules • Maintains user lists, passwords, encryption keys, and other authentication and security-related information and databases • Develops and follows procedures for reporting on monitored controls Security Analyst
  • 102. The primary role of this position is to support the security architect, security engineer, security administrator, and security management in analyzing and producing reports required for the assessment and smooth functioning of security operations. The security analyst may hold vendor-oriented certifications such as those offered by Cisco, Microsoft, Enterasys, Symantec, Oracle, and McAfee. Among other duties, the security analyst: • Monitors alerts and reports generated by security systems • Reviews log files as generated by security devices and servers, making note of anomalies • Compiles reports as required by management or as specified by security policy • Maintains security metrics • Collaborates with security organization team members to assess and analyze security operations and suggests improvement • Manages quality control and change management initiatives for the security organization • Maintains security policy documentation and ensures that necessary changes are incorporated as directed by the architect or management
  • 103. Security Investigator This position is responsible for Legal, HR, and internal investigations into security incidents, breaches, attacks, and violations. The security investigator often works closely with law enforcement agencies as needed. Skills required include technical expertise as well as evidence handling and forensic procedures. The security investigator may hold industry-related certifications in forensics and incident response. Among other duties, the security investigator: • Responds to requests from HR, Legal, and other internal departments to investigate incidents • Coordinates with outside attorneys or law enforcement representatives • Collects and preserves evidence from computer systems • Performs e-discovery and forensic searches for keywords and patterns • Produces detailed reports on investigations • Provides information to the HR and Legal departments for action • Maintains strict secrecy about ongoing investigations
  • 104. Security Awareness Trainer The primary role of this position is to develop and deliver security awareness training to the business based on corporate security policy, standards, procedures, and guidelines. The trainer generally has a background in security as well as in education and training. The trainer coordinates and collaborates with the security department subject matter experts to ensure that the training is both comprehensive and accurate. This position may alternatively reside in another department within the business, typically Human Resources or Communications. An important characteristic of this position is that the skill set required for the delivery of effective security awareness training is not often found within an IT department, yet the position requires detailed security knowledge. Assigning security engineers and security administrators to produce training materials can be ineffective, due to the highly technical nature of their work and the requirement for delivering training in “plain English.” The trainer must be skilled in interpreting technical information for the business’ employees in a way that is
  • 105. understandable, fresh, interesting, and highly relevant. Facility Security Officer The primary role of this position is to enforce the business’ physical security policy at each building location. Each major facility location should have a security officer responsible for coordinating all physical security–related activities and incidents at the facility. The person in this position is not the same person who is operationally responsible for the computer equipment at the facility. The facility security officer has the authority to take action without the approval of the management at the facility when required to ensure physical security. This position also typically works within a Facilities department rather than IT. All physical security reports are reviewed by the facility security officer. For example, this position reviews log files of facility access records, such as key card logs. The facility security officer is responsible for coordinating all activities related to security incidents at the facility and has the authority to decide
  • 106. what actions are to be taken as directed by the incident response procedures. The facility security officer coordinates all activities with the corporate security manager, director, or vice president. Application Security Functions In organizations that develop in-house code for applications used internally, depending on the size and complexity of the application development process there may be a justification for at least one application security specialist. This person would need to be highly knowledgeable about the programming languages being used, and well-trained in security programming techniques (as described in Chapters 26 through 30 of this book). The role of this job function is to provide guidance and training to programmers on how to write secure code, and to review every line of code produced by the programmers for security vulnerabilities and flaws. Commercial code scanners and application testing technologies would also be used by the person in this role to scan and test in-house software for flaws. Alternatively, an outside organization may be contracted to perform code reviews and scanning. Code
  • 107. review and sign-off by this security function should be required before promoting any code to production. Business Continuity and Disaster Recovery Planning Functions Depending on the size of the business, business continuity planning (BCP) and disaster recovery (DR) planning and testing may be done by one person (in smaller organizations) or several people in each function (in larger organizations). The question of whether these functions belong within the security organization is best determined by the needs of the business. Generally speaking, smaller businesses that have these functions performed by one or two people should place them in the security organization, while larger businesses may benefit from a dedicated organization for BCP and DR. A good rule of thumb is that they should be part of the information security organization if their work is primarily technical in nature, whereas they should reside elsewhere in the business if their focus is more business-oriented than technical. Chapter 32 covers these functions in more detail. Non-Security Jobs with Security Responsibilities
  • 108. Several individuals in a business have important responsibilities in the maintenance of security. These individuals may or may not focus exclusively on security in their jobs. Some of these positions are security positions; others are held by people who are responsible for keeping the business secure even if their primary job is something else. Every IT department has system and network administrators. Sometimes these are the same person; sometimes the duties are divided among different individuals or departments. Regardless of the reporting structure, the system and network administrators bear important security responsibilities. System administrators build new computer systems; install operating systems; install and configure software; and perform troubleshooting, maintenance, and repairs. In the course of all these functions, system administrators apply security standards and policies. Operating systems must be installed in compliance with the security standards for their particular application. This usually includes turning off unneeded services (known as hardening), applying the latest security updates and patches, and applying templates and secure configurations to software applications.
  • 109. Any oversight or failure to consider the security of the system can compromise the entire organization, so the system administrator position is crucial to the success of the security program. Network administrators have responsibilities and levels of access that require them to conform to security standards and policies as well. Often, the network administrator is responsible for firewall and router configurations that apply the business’ security policy in specific situations. Incorrect or inappropriate configuration choices can open up security holes that put the entire business at risk. Data that is resident on computer systems, shared storage devices, databases, and applications must be handled securely. This means encrypting data in storage (or at rest) and data in transit, performing change control, and implementing access controls and authorization levels to ensure that only the right people can get to the information. The operational responsibility for this data security management falls into the domains of the data owners and the data custodians. Data owners make the decisions that
  • 110. determine who should modify, view, change, and create information files. The owner of each piece of data should identify who is the intended audience, who can make changes, and who can erase the data. The data custodian implements the decisions of the data owner by making approved changes, presenting the data to the appropriate audience, and properly destroying the data when it is deleted. When sensitive data is strongly overwritten, the data custodian ensures that the data is properly destroyed. Security Incident Response Team Security incident response teams are known by several names. Some are called SRT for security response team, some are called CIRT for computer incident response team, and some are called IRT for incident response team (which is the term used in the following discussion). Regardless of the specific terminology, these teams are collections of individuals from various parts of the business who are brought together to handle emergencies. They join the team apart from their daily responsibilities in order to prepare, practice, and drill for potential emergencies and, in the event of an actual emergency,
  • 111. handle the situation. Examples of the types of incidents a response team might handle include • Hostile intrusions into the network by unauthorized people • Damaging or hostile software loose on a system or on the network • Unauthorized access or acceptable use violations resulting in the need for investigations of personnel • Virus activity • Software failures, system crashes, and network outages • Participation in external investigations by law enforcement, government regulators, or international watchdog and legal organizations • Court-ordered discovery, evidentiary, or investigative legal action • Illegal activities such as software piracy Every business performs incident response, whether or not they have an official IRT established. In many businesses where there is no IRT, individual employees perform incident response by dealing with incidents in their own way. A software virus outbreak is one example. In businesses without an IRT,
  • 112. employees may choose to install antivirus software, run specialized virus cleaning software, or just live with a virus infestation. In these situations, no coordination happens and virus response varies with each individual, usually without enterprise-wide success. One advantage of an organized IRT is that it can deal with incidents like this on a higher level, with more comprehensive success. Members of an IRT should include technical experts who can evaluate incidents like network intrusions, software failures, and virus outbreaks on a technical level; administrators who can keep logs and maintain the paperwork and electronic information associated with an incident investigation; managers who coordinate the work of the IRT members; and, if available, IRT specialists who have served on prior IRTs. None of these individuals necessarily needs to be assigned to the IRT as a full-time position. Typically, businesses that establish an IRT leverage employees from many other parts of the business and ask them to share their responsibilities between their regular job and the IRT.
  • 113. An IRT can be assigned individuals with specific technical expertise in a variety of areas. Depending on the business and the types of technologies used in the infrastructure, this expertise may include • Virus management • Hostile software detection and management • Vulnerability analysis • Specific hardware platforms • Specific operating systems • Commercial off-the-shelf or open source tools and applications • Custom-developed or in-house-developed software and/or scripts The IRT should have a clearly defined depth of standard investigations, because investigations become more expensive and time-consuming as they go deeper. The basic investigative lifecycle includes Preparation, Identification, Detection, Eradication, Recovery, and Lessons Learned. The IRT may also need to prioritize its activities, especially in cases where several incidents happen at once, and this prioritization should be directed by management rather than the individual team members, to keep the
  • 114. team aligned with the corporate goals. Daily IRT operations can include interpretation of reported incidents; prioritization and correlation with existing efforts; evaluation of current trends and industry experiences; verification that incidents are real; categorization of incidents; and summarization and reporting to management, end users, and outside agencies. Once incidents are identified and evaluated, removal of the cause by blocking or fixing the exploited vulnerability and restoration of the original state of the impacted system or network can be performed. During the entire process, a careful log and audit trail should be preserved, and information gathered should be evaluated to determine how to improve IRT operations in the future (and this information may be required for legal purposes if prosecution is pursued). Many aspects of an IRT’s actions can be identified, categorized, and codified. These actions should be documented as part of an operational procedure manual. This allows individual team contributors to make informed and appropriate decisions during the heat of an incident. Operational procedures can
  • 115. include standard incident response process, vulnerability analysis and remediation, communication with other groups and with the general business entity, coordination with law enforcement and the court system, and evidence handling and audit trail maintenance. Many businesses want to have their own in-house IRT, so the team can integrate into the corporate culture and become more informed and effective. Others prefer to outsource this function to avoid having to hire incident response specialists. Outsourcing carries the additional advantage of pay-as-you- go, where costs associated with incident response occur only when the IRT is activated during an incident. Incident handling should be done according to a consistent set of well-documented procedures, in case a court proceeding is required. Investigation manuals are available from a variety of sources that can be used to guide the investigator. Managed Security Services Most organizations, whether large or small, have difficulty achieving a high enough level of information security to comply with industry best practices. Very few
  • 116. businesses invest in an internal security organization with enough resources to do everything the business would like to do. Most businesses realize this but continue to do business with the hope that nothing bad will happen. However, more businesses are beginning to recognize the value of outsourcing services that are not central to their core business. It’s rare for modern businesses to hire their own cafeteria staff or housekeeping staff or, in many cases, even handle their own payroll. It would be unthinkable for most businesses to maintain a force of air transportation. Now, other types of services are beginning to come under the same scrutiny for efficiency, quality, and cost- effectiveness. Managed Security Service Providers (MSSPs), outside firms contracted by businesses to perform specific security tasks, are becoming increasingly popular and viable for modern businesses. These firms are businesses that hire specialized staff with expertise in focused areas such as firewall management, intrusion-detection analysis, and vulnerability analysis and remediation. Often, these companies are able to hire specialists that are more advanced than what other
  • 117. businesses can afford, because of their specialization. Their customers are then able to gain access to this expertise without having to pay the salaries and infrastructure costs, which are absorbed by the MSSP. There are four good reasons to look to an information security provider for outsourced services: • Security expertise is not found in-house. • Security is required 24×7×365 while functionality may be required only for certain business windows (for example, 8 A.M. to 5 P.M.). • Vast amounts of data must be examined. • Specialized skill sets are hard to find. A security infrastructure requires constant vigilance. It’s not enough to rely on automated software that can be tricked, or might crash, or may overlook important scenarios. Human intelligence is needed to analyze activity and make decisions on the spot. It’s not enough to have one person with a mobile phone—three shifts are required. Moreover, intruders don’t take vacations, and they attack from all the different time zones.
  • 118. Identifying security threats and making decisions about how to respond involves sifting through log files, network activity, and configurations. False positives, true positives, false negatives, and true negatives are all possible outcomes from an inspection—one system communicating legitimately with another may appear to be an attack, or a system administrator performing a routine upgrade may look like an intruder. Somebody needs to be able to investigate these situations properly to determine the most appropriate response. All of this requires advanced skills. Experienced security specialists are hard to find, but security service providers can attract senior-level staff because the people who specialize in security are attracted to businesses that focus on their field of expertise. MSSPs must adhere to an organization’s policy, standards, procedures, and guidelines and should be subject to auditing. Outsourcing security functions to MSSPs changes the business equation from one of running and managing a 24×7 operation in an in-house shop to vendor
  • 119. management. Most businesses are more experienced with the latter than the former, but the key to success is to manage the vendor properly to meet the expectations and needs of the business. There are pros and cons associated with outsourcing security operations to MSSPs. Benefits and advantages include • Experience • Cost savings • Fast implementation • Adaptability • Infrastructure Liabilities and disadvantages include • Delays in processing events and incidents • Failure to adhere to service level agreements • Performance that does not meet expectations • Inability to perform timely investigative responses • Inability to align to the primary business’ mission and business objectives When information security is the primary business of an
  • 120. organization, that organization will have a strong business motivation to invest in a world-class security infrastructure. In addition, that organization will work with many different customers with widely varying environments, and it will implement many different types of security solutions. Information security providers bring this experience to bear in their customers’ environments, providing a level of quality that can’t be matched by organizations that don’t specialize in security. In general, service providers may save their customers money by performing a service more efficiently than the customers can perform it on their own. Service providers leverage their staff of specialists to service many different accounts, thus giving everyone the benefit of industry leadership. Additionally, they often produce methodologies, best practices, and standards that can be applied in their business relationships. These business tools often enable service providers to provide significant cost savings to their customers. Many projects fall behind schedule or have difficulty getting off
  • 121. the ground due to lack of resources, management support, financing, or effective project management. Service providers often avoid these problems by applying all these components in a focused way to the projects on which they are engaged. Service providers have a strong business motivation to succeed in the projects they take on. Because security providers work with many different technologies and products, they have a level of flexibility often denied to other organizations. The number of security specialists most organizations can afford to employ is usually much smaller than the number a security provider can afford to employ, and the former’s staff usually has a skill set that is limited to the products with which the staff members have personally worked. This gives service providers the advantage of flexibility, since their staff is larger and more focused on the task at hand. Unlike with most organizations, the information security infrastructure of a security provider is revenue- generating rather than an expense. For that reason, the security provider can apply a greater amount of resources to developing its infrastructure and can leverage that infrastructure to the advantage of the
  • 122. customer. Security providers have the motivation to spare no expense to produce a world-class infrastructure, and their customers reap the benefits. Services Performed by MSSPs On Internet connections, wide area networks, and local area networks, MSSPs provide • Incident detection • Incident logging • Proactive response • Reactive response Different zones of an organization’s data network can be monitored and managed from a security perspective. Typically, these can include the corporate LAN, the WAN connections to remote sites, and connections over public networks such as the Internet and even cloud services. Many organizations have virtual private networks (VPNs) to connect employees to their network or to connect other sites, and many organizations also have extranet connections to partners, service providers, and customers. Each of these zones should be managed and monitored from a security perspective, and each should
  • 123. adhere to strong security principles. Each will have differing requirements for access and privacy. Whenever a problem occurs, such as unauthorized access or misuse, detecting the incident is crucial to the success of an organization’s security. Recent data losses by some well-known companies were not detected right away and left those companies embarrassed after the incidents were reported in the press. In some highly publicized cases, those companies did not know for several weeks that they were taken advantage of. Potentially even more important than the loss of PR is the loss of opportunity when incidents go undetected. Security violations that are detected right away can be dealt with during the incident, which not only affords the opportunity to shut down the attack before serious harm occurs, but also prevents the loss of credibility that is crucial to many organizations’ customer relationships. Incidents in progress can also be logged in detail for potential legal action or for further investigation after the incident has concluded.
  • 124. Many organizations desire proactive response, which is to say, prevention of security violations before they take place. Blocking attacks while continuing to perform logging of data can be of great value to an organization. Reactive response is also important; it usually involves human interaction to determine what course of action is best for the business, up to and including disconnection of service—a decision that might cost an organization thousands of dollars in lost revenue but may save millions in lost data. Decisions like that require a quick link between the people monitoring the security and the people making the business decisions. Services That Can Be Monitored by MSSPs Security service providers can provide monitoring of many different types of activities. MSSPs will typically monitor the network for unusual or suspicious activity and identify anything that requires direct intervention or incident response. In such cases, they either raise an alert to IT or information security staff, or they may perform a direct intervention if they have the access and ability (and the contract provides this service). The activities that may be monitored by
  • 125. an MSSP include • Unauthorized access attempts to firewalls, systems, and network devices • Port scanning • System intrusion detection originating from a protected system behind a firewall • Network intrusion detection originating from “probe” devices connected to the protected internal network • Root and administrator account usage • Denial of services • Other relevant security events Many security service providers can also provide additional value-added services, such as: • Detection of nonstandard behavior of services • Detection of changes to systems • Reduction of false alarms by employing human intelligence • Correlation between events on the internal network and the Internet • Providing updates of the latest security products, threats, and vulnerabilities
  • 126. • Scanning and reporting on vulnerabilities • Support and training Many organizations want to know about authorized as well as unauthorized activities. Managing a data infrastructure is a complex business, and knowing what constitutes a normal pattern of behavior can be a significant asset to managers. Security Council, Steering Committee, or Board of Directors The security organization should be included in all efforts that involve corporate data and resources. Many different departments handle data, not just IT. For example, the HR department handles confidential employee information. The Legal department handles confidential business and customer information. The Facilities department may handle badging and physical access. Generally speaking, every major department in the business has some level of interaction with business resources and data. All of these departments should coordinate with the security organization. In most businesses, the security team meets with almost every manager of the business, and sometimes with most of the
  • 127. employees. A security council or steering committee, whose members include representatives from each major business department, provides a forum for information exchange that facilitates the job of the security practitioner and identifies business requirements to which the security organization should be privy. Each security council representative provides status updates of initiatives within that representative’s organization, and each receives information from the security organization about initiatives and practices that impact each of them. The security council can be used in a variety of ways. Information gathering is one important opportunity. Members of the security council have unique visibility into the operation of their part of the business. This visibility is important to the comprehensiveness of the security practitioner’s focus. For example, a department that is considering a new technology initiative may not have considered the security impact on the rest of the network, but the security practitioner, upon hearing about the initiative, may make conceptual connections overlooked by the
  • 128. individual department. A security council or steering committee can also be an effective risk management tool. The purpose of a risk analysis is to identify as many business risks as possible, and then either accept, mitigate, or transfer those risks. Any risks that are overlooked by a risk analysis put the business in jeopardy if any of those risks become realized. Members of the security council can be polled to identify specific business risks in each of their specialties, and this provides a risk analysis with a greater scope and better coverage. Another advantage is that it gives a sense of participation and teamwork to business departments that may otherwise act independently without consulting each other, or even compete for resources or produce conflicting infrastructures. Interaction with Human Resources Human Resources departments need to provide required information about new hires to security administrators before the new hires’ start date. This is an important interaction between HR and IT, even if the security organization is not part of the hiring
  • 129. procedure. Security administrators need to know at any point in time whose employment with the business is valid, so they can properly maintain and monitor accounts on systems and on the network. Perhaps even more important, HR also reports required information about terminations to system administrators before the final termination occurs. The security organization is always involved in terminations to some extent, because employee terminations result in the revocation of trust. When trust is revoked, assurance must be provided that all access has been revoked, and activity must be monitored to ensure the maintenance of that revocation. HR manages contractor information and provides this information to security administrators. Contractors, as temporary employees, present special probl ems to security administrators. They often work for only a short time and sometimes come and go, resulting in a constant process of granting and revoking physical access and system and network accounts. It’s hard to tell when seeing a contractor in
  • 130. the hallways whether they should be there or not. The security of the network relies heavily on the timely transfer of information from HR to the security organization. HR, in turn, requires timely information from individual managers regarding the status of their contractors hired directly and managed individually. HR performs background checks, credit checks, and reference checks on new employee applicants. Exit interviews are conducted with terminating employees to recover portable computers, telephones, smart cards, business equipment, keys, and identification badges and to identify morale problems if they exist. Employees discharged for cause must be escorted from the premises immediately and prohibited from returning, both to reduce the threat of retaliation and to forestall any questions if unexpected activity occurs on the network or on the premises. Monitoring the activities of employees is a matter of corporate culture—those organizations that want to do it differ in the extent and type of response they choose. Likewise, the treatment of confidential and private information differs from business to business, but these are issues that should be dealt with
  • 131. by every organization. If an organization hasn’t gotten around to a formal policy on these issues, the best time to start is now, before a policy violation occurs when there is no clear, documented policy that has been communicated to all employees. Communication is truly the key to successful security management. Physical security should not be overlooked, and periodic fire drills can be used to test security measures, help close any gaps, and avoid the danger of having a false sense of security. Summary Every business needs a risk management approach that is headed by a top level organization, dedicated to risk management and information security. This organization requires executive-level representation in the business, because the management of risks related to information security is ultimately the responsibility of senior management—whether the business is regulated or not, the top executives are on the hook for any consequences that occur due to failure of security controls. The CSRO or CISO is the highest level of security manager in midsize and larger businesses, with ultimate responsibility for all
  • 132. security efforts for the business. Regardless of the specific functions within the security organization, the definition of who does what should be well defined in an org chart with clear responsibilities assigned to each individual, so security can be properly managed. Security functions include strategic positions such as management, architecture, and policy specialists, as well as operational positions such as administrators, analysts, and investigators. Other functions such as BCP, DR, and physical security may also reside within the information security organization, depending on the nature of the business. In addition to these full-time roles, security response teams are comprised of collections of individuals from various parts of the business who are removed from their daily responsibilities and brought together to prepare, practice, and drill for emergencies, and these are the people who handle emergencies when they arise. Further, a corporate security council or steering committee, whose members include representatives from each major department in the business that are stakeholders in the end result of the security program, provides a forum for
  • 133. information exchange and input into the decisions that shape the security program. For those functions not staffed internally, MSSPs are an option. These outside firms are contracted by businesses to perform specific security tasks such as monitoring, alerting, and incident response. MSSPs are becoming increasingly popular for many security roles because they can be less expensive, more efficient, and more effective than what many businesses are capable of building in-house (especially for 24 × 7 service). References Bassett, Jackie, and Dan Rothman. A Seat at the Table for CEOs & CSOs. Digital edition. AuthorHouse, 2007. Collette, Ron, Michael Gentile, and Skye Gentile. CISO Soft Skills: Securing Organizations Impaired by Employee Politics, Apathy, and Intolerant Perspectives. Auerbach Publications, 2008. Erbschloe, Michael. The Executive’s Guide to Privacy Management. McGraw-Hill/Osborne, 2001. Fitzgerald, Todd, and Micki Krause. CISO Leadership: Essential Principles for Success. (ISC)2 Press, 2007.
  • 134. Gentile, Michael, Ron Collette, and Thomas August. The CISO Handbook: A Practical Guide to Securing Your Company. Auerbach Publications, 2005. Kovacich, Gerald L. The Information Systems Security Officer’s Guide. 2nd ed. Butterworth-Heinemann, 2003. Lam, J. “Enterprise-Wide Risk Management and the Role of the Chief Risk Officer.” ERisk.com, March 25, 2000. Soo Hoo, K. “How Much Is Enough? A Risk-Management Approach to Computer Security.” Presented at the Workshop on Economics and Information Security, University of California at Berkeley, May 2002. NAME: TODAY’S DATE: ISEC 610 Homework 2 Question 1 Match policies, standards, procedures, and guidelines described in Chapter-5 with the security roles described in Chapter-6. There are two sample rows. Fill out five extra rows similarly.
  • 135. Document example Security role Description of the relationship IDS/IPS maintenance/monitoring procedure Security Engineer (SE) SE develops this procedure. SE performs IDS/IPS maintenance and monitoring according to this procedure. SE is responsible for updating this procedure. Organization-wide security policies Security Director (SD) SD manages the development and implementation of global security policies Question 2 – Weekly learning and reflection In two to three paragraphs of prose (i.e., sentences, not bullet lists) using APA style citations if needed, summarize and interact with the content that was covered this week in class. In your summary, you should highlight the major topics, theories, practices, and knowledge that were covered. Your summary should also interact with the material through personal
  • 136. observations, reflections, and applications to the field of study. In particular, highlight what surprised, enlightened, or otherwise engaged you. Make sure to include at least one thing that you’re still confused about or ask a question about the content or the field. In other words, you should think and write critically not just about what was presented but also what you have learned through the session. Questions asked here will be summarized and answered anonymously in the next class.