2 - Security Policies and Procedures Flashcards
Internal and external changes force organizations to evolve on what levels?
operation, tactical, and strategic
What are security policies?
documents that provide the foundation for organization security goals
Policies created by organizations are a reflection of what?
The external laws and regulations that apply to the organization
What does policy life cycle management involve?
the creation, usage, and retirement of policies
What does performing a risk assessment identify?
risks to organizational assets
What should be used to guide policy creation?
policy templates
Where should policy input be sought?
from executives and other stakeholders
What should be established for policy violations?
penalties
To whom should organizational policies be published?
all employees in the organization
The organization should ensure staff members do what when a policy is published?
read, understand, and sign the policy
What should be used to enforce policies whenever possible?
technology
Who should be educated about organizational policy contents?
organizational staff
How often should policy reviews be scheduled?
annually or semi-annually
When should a policy be retired?
When it’s no longer applicable
Organizational policies can focus on what?
all aspects of an organization
System-specific policies focus on what?
specific computers or network systems, and the necessary security controls that protect them
Issue-specific policies focus on what?
specific organizational issues such as department issues, business products, processes, and others
Regulatory policies ensure that an organization does what?
follows the legal requirements of compliance law
Advisory polices do what?
provide strong recommendations or reminders for employees to consider
Informative policies do what?
gentle recommendations or reminders for employees to consider
Standards are required elements regarding what?
the implementation of controls or procedures in support of a policy
Guidelines do what?
specify optional and recommended security controls or processes to be followed