230 likes | 239 Views
User Policy. (slides from Michael Ee and Julia Gideon). What are End-User Policies?. Gives users rules that they must follow as end-users of a particular system Covers all information security topics that end-users need to know for: Compliance Implementation. What are End-User Policies?.
E N D
User Policy (slides from Michael Ee and Julia Gideon)
What are End-User Policies? • Gives users rules that they must follow as end-users of a particular system • Covers all information security topics that end-users need to know for: • Compliance • Implementation
What are End-User Policies? • Sets ‘expected behavior’ by users • Single resource for system users • Supports organization’s governing policies • Closely aligned with existing and future HR policies for all employees • Important to the mission, value, and culture of a company • All associates ‘on the same page’
Why are End-User Policies Important? • Sets expectations • Foundation for security environment • Human error is one of the major security challenges • Security versus usability • Workarounds by employees • Unfamiliar with computer system
Why are End Use Policies Important? • Very Strict Policies • Use of assets only for company business • Can create climate of distrust • Very Lenient Policies • Organization loses money in terms of equipment and resources
Why are End-User Policies Important? • “Acceptable behavior” ambiguous • Information Security is a new field • End user policies help decrease ambiguity
Writing End-User Policies • Address the ‘what’ aspect of security policy in more detail • Give rationale for policies • Separate background information • Consult during development phase • Human Resources • Compliance/Audit • User groups
Writing End-User Policies • Human Resources • Assists in making sure that overlapping policies agree • Hiring • Firing • Corrective Measures
Compliance Group that monitors employee actions Follows through with corrective measures Assist in writing enforceable policies Ensure that written policies can be made compulsory Writing End-User Policies
Writing End-User Policies • User Groups • Facilitates prioritization • Should provide focus for business goals • Understandable • Compliance relies on the ability to understand
Impacts of User Policy • Establish logical controls to prevent unauthorized access • Identify authorized users • Define access to resources • Create audit trails • Should aid in defending upon intrusion • Enhance resiliency
Impacts of User Policy • Assist in discouraging misuse of company resources • Browsers • Net access • Games • Software Piracy • Under reporting installations • Making unauthorized copies • Legal and economic issues
Impacts of User Policy • Assist in discouraging misuse and theft of company resources • Personal computers • Library resources • Telephones and wireless communication • Copiers • Office Supplies
Impacts of User Policy • User Keys/Passwords • Typically associated with password (e.g. PGP, hardisk encryption etc) • Dictates rules for end-users when creating passwords • Critical policy
Impacts of User Policy • Establishes best Practices (case by case varies) • Procedures (forgotten password, suspected compromised etc ) • Equivalent treatment to ALL.
Impacts of User Policy • Dealing with E-mail • Recognized method of communication within organizations as well as a new vehicle for external communication • More tangible than voice mail and faster than paper mail • User groups will list it high on priorities
Impacts of User Policy • Similar guidelines to Internet • All emails remain property of organization (no expectation of privacy) - inform end-users • Duration of retention (check with local laws)
Impacts of User Policy • Professional conduct • Using company email for personal usage ? All work-related issues ? • Define explicitly what is unacceptable and prohibited • Web-based email ?
Other User Policy Issues • Contractors/consultants and vendors ? • Media and law-enforcement ? • External end-users (e.g. event attendees etc) • Procedures for exceptions
Other User Policy Issues • Remote Access • Within network ? • Requirement of job function ? • Logical extension of organization network – implications ? • Security • Office-issued equipment
Final Thoughts • User policy must reflect the organizational culture • Must be comprehensive, understandable, and enforceable • Set the foundation for the entire security environment