90 likes | 97 Views
Learn the importance of computer security policies, their common components, and types. Discover what makes a successful policy, how to develop, and implement them effectively. Get insights on management instructions, guidelines, standards, and procedures, along with the difference between "must" and "should." Understand how policies form the foundation of security operations and how they prevent chaos. Find out ways to tailor policies to your organization and ensure clarity and brevity in their communication. Accessible publication methods are key, and implementation challenges such as lack of management support and user training are discussed.
E N D
Developing Computer Security Policy Ward Parker Global Integrity
What Are Policies? • Management instructions • Provide overall objectives • Guidelines, Standards, Procedures • Difference between “must” and “should”
Why are Policies Important? • Foundation of all Computer Security Operations • Effective vs.. Chaos • Got a good lawyer? • Cart before the Horse Syndrome • Put Management to work for you
What Makes a Successful Policy? • Brevity is an Art • Clarity is your friend • Give them what they need, not what they want • Tailor to the organization • Eating an elephant
Types of Policies • Regulatory • Advisory • Informative
Common Components • Statement of Policy • Authorizing individual • Author • Reference to other policies, if any • Measurement of Expectations • Waiver Requests • Process for Requesting Change • Violation • Effective Date • Review Date
Publication Methods • Policy Manual • Personal Guides • Brochures • On-line Documents Whatever you choose, make sure they are accessible!
Implementation…Nobody Said It Would Be Easy • Management doesn’t understand importance • Lack of support throughout organization • Awareness & Training of users
Questions/Comments • Sources: • “Information Security Made Easy” • “Handbook of Information Security Management” • (703) 293-5302/wcp@globalintegrity.com