320 likes | 336 Views
Get an overview of policies and disaster recovery in this week 1 outline. Understand the role of policy in government and corporate culture, and learn how to define and enforce information security policies.
E N D
OUTLINE • Introductions • Syllabus • Grading Scheme • Guidelines/Suggestions • Homework/Paper-Presentation
Who am I? • Dave Climek, Adjunct Lecturer • 10 years here at SUNY • 29 years associated with the US Air Force • AAS Electrical Engineering Technology - Canton • BT Electrical Engineering - Buffalo State • BS Telecommunications - SUNYIT • MS Telecommunications - SUNYIT • MS Business Management – SUNYIT • MS Information Assurance – Norwich University
Who are you? • Name • Work Experience • Educational Background • What are you hoping to get from this course?
Introductions • Contact Card • Name • Phone Number • Email • Major • Background • Work Experience • Expectations:What are you hoping to get from this course?
Syllabus • Phone Numbers, Email • Textbooks, Additional Reading • Overview, Objectives • Grading • 2 Assessments • Homework/Formats • Technology Paper & Presentation • Course Outline
Class Web Page • http://people.sunyit.edu/~climekd • Copy of Syllabus • Copy of this week’s slides • Copy of homework overview • Copy of paper/presentation topics
Suggestions • Read textbooks • Download lecture notes • Keep up with homework assignments • Start paper/presentation as soon as possible • Come to class
TEL382 Greene Chapter 1
Outline • Defining Policy • Policy Through the Ages • Role of Policy in Government • Role of Policy in Corporate Culture • Psychology of Policy • Introducing Policy • Acceptance of Policy • Enforcing Information Security Policies
Defining Policy • According to Merriam-Webster, policy is: • “prudence or wisdom in the management of affairs” • “management or procedure based primarily on material interest” • “a definite course or method of action selected from among alternatives and in light of given conditions to guide and determine present and future decisions” • Information Security Policy: • Document that states how an organization plans to protect the organization’s tangible and intangible information assets • Management instructions indicating a course of action, a guiding principle, or an appropriate procedure • High-level statements that provide guidance to workers who must make present and future decisions • Generalized requirements that must be written down and communicated to certain groups of people inside, and in some cases outside, the organization
Information Assets • Tangible • Facilities, hardware, software, media, supplies, documentation, customer data, etc. • Intangible • Body of information an organization must have to conduct its business mission, reputation, intellectual capital, intellectual property, etc. • Information States • Stored, Processed, Transmitted • Locations • IT Systems, Paper, Brains
Policy Through the Ages • Policies, laws, codes of justice, etc. have been around for a long time • Examples • Bible • US Constitution • Etc.
Role of Policy in Government • Monroe Doctrine – 1823 • US independent of Europe • US interests extend to Central and South America
Role of Policy in Corporate Culture • Corporate Culture: shared attitudes, values, goals, and practices that characterize a company or organization • Policies provide consistency for customers and employees • Discipline • Rewards • Financial Modernization Act of 1999 (Gramm-Leach Bliley – GLBA) • Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Psychology of Policy • Reaction is to rebel against unexplained rules • Policy Development, Introduction, Enforcement • Seek Input from members • Introduce through training • Consistently enforce • Identify Key People/Roles • Board of Directors • Senior Mgrs, C-level positions • Dept Mgrs • Supervisors/Mgrs with vendors, service providers • Info/Data Owners & Custodians • Users
Introducing Policy • Get approval from Board of Directors/Executive Management • BoD, if regulated industry • Introduce Policy to Organization • Awareness Training Program • Email • Memos • Etc.
Acceptance of Policy • Not a “one shot” endeavor; requires constant and continual effort • Best if top down driven • Management shows by example • Reinforcement Through Communications • Intranet pages • Paycheck envelope “fillers” • On-line security awareness technologies • Screen Savers • Email or discussion post distribution • Permanent agenda item at all department meetings • Responding to Environmental Changes • Must keep up with organizational/technological changes
Enforcing Information Security Policies • Some policies can be automatically monitored • Those can cannot must be monitored by third-party monitoring and audit tools • Third-party monitoring and audit tools help monitor users who don’t know what they are doing • Enforcement • When rule breaking is not punished, the rules become meaningless • Enforcement must be consistent • Consequences must be commensurate with the criticality of the information the policy was written to protect
TEL382 Greene Chapter 2
Outline • Policies, Standards, Guidelines, Procedures • Developing Policy Style and Format • Defining Policy Elements • Statement of Authority • Policy Heading • Policy Objective • Statement of Purpose • Policy Statements • Exception to Policy • Policy Enforcement • Definitions
Policies, Standards, Guidelines, Procedures • Regulatory Policy Content Requirements • Policy Objective • Statement of Purpose • Statement of Exceptions • Actual Policy Statement • Statement of violation consequences • Date policy was written and revised • Schedule for future review and revision • Standards • Specific minimum requirements in policy • May change from time to time • Example: Password Requirements (length, special char, history, etc.) • Guidelines • Suggestions for best way to accomplish • May change more often • Example: Password Suggestions (Use phrase, song title, saying, etc.) • Procedures • Instructions necessary to carry out a policy statement • May change as needed • Example: Steps to change password
Developing Policy Style and Format • Know your intended audience • Plan before you write • Use a template • Policy Format • Each policy is a separate discrete document OR • One large policy document with multiple sections • Short, concise • Sections • Objectives, Purpose, Audience, Policy Statement, Exceptions, Disciplinary Actions (& Dates – Written revised, reviewed, etc. & Approval Authority)
Defining Policy ElementsStatement of Authority • May serve as a preface to a group of policies • Explains motivation • Regulatory compliance • Other
Policy Heading • Contains all logistical information • Contents may include: • Security domain, subsection, policy number • Name or organization and document • Effective dates, authors • Change control documentation • Relevant cross-references • Approval authority
Policy Objective • What is the goal of our policy? • What are we attempting to achieve with this policy?
Statement of Purpose • Why does the policy exist? • Explains why the policy was adopted • Provides understanding and motivation to users
Policy Audience • Who is the policy intended for? • Policies may be targeted for specific employees and/or positions • May apply to outsiders • Partners, vendors, clients • Unless specified, policies apply to all information system users, owners, and custodians
Policy Statements • Focuses specifically on the rules • Systematic list of rules and actions to be taken to control the risks associated with threats and vulnerabilities • Reference other documents that apply (Standards, Guidelines, Procedures, etc.) • Must be clear, concise and unambiguous
Exception to Policy • Special situations call for exceptions to the rules • Language must be clear, concise, unambiguous and include a process by which exceptions may be granted • Keep exceptions low; If there are many- • Maybe rule is not appropriate the first place • Employees may perceive rule as unimportant • Employees may perceive favoritism toward some • It becomes too difficult to keep track of and audit them
Policy Enforcement • Assert seriousness of policy • Cannot list every punishment for every infraction • Describe a disciplinary process and list most severe punishment • Must be proportional to broken rule and subsequent risk exposure • Must then develop process and schedule applicable disciplinary actions • Plus contingency for repeat offences • Does not negate the need to properly educate and train users
Definitions • Include definitions for any non-standard language • Remember policy purpose is to communicate and educate • Some users may not be in-house employees • Identify target audience and write to the lowest common denominator • Definitions help to remove ambiguity that may be claimed in any legal proceedings