Chapter 9 Policy and Compliance Flashcards
Contains a series of documents designed to describe the organization’s security program
Information security policy framework
Information security policy frameworks generally include four different types of documents, what are they?
Policies
Standards
Procedures
Guidelines
- High-level statements of management intent
- A statement of the importance of cybersecurity to an organization
- Requirement that all staff and contracts take measures to protect the confidentiality, integrity, and availability of information and information systems
- Statement of ownership of information created and or possessed by the organization Designation of the chief information security officer (CISO) or other individual as an executive responsible for cyber security issues
- Delegation of authority granting the CISO the ability to create standards, procedures, and guidelines that implement the policy
Policies
- Common document that is often apart of an organization’s information security policy library
- Provides high level of authority and guidance for the security program
Information security policy
- Common document that is often apart of an organization’s information security policy library
- Provides network and system users with clear direction on permissible uses of information resources
Acceptable use policy
- Common document that is often apart of an organization’s information security policy library
- Clearly states the ownership of information created or used by the organization
Data ownership policy
- Common document that is often apart of an organization’s information security policy library
- Describe the classification structure used by the organization and the process used to properly assign classifications to data
Data classification policy
- Common document that is often apart of an organization’s information security policy library
- Outlines what information organization will maintain and the length of time different categories of information will be retained prior to destruction
Data retention policy
- Common document that is often apart of an organization’s information security policy library
- Describe the account life cycle from provisioning through active use and decommissioning
Account management policy
- Common document that is often apart of an organization’s information security policy library
- Set forth requirements for password length, complexity, reuse, and similar issues
Password policy
- Provides mandatory requirements describing how an organization will carry out its information security policies
- i.e. the specific configuration settings used for OS systems, controls put in place for highly sensitive information and etc
Standards
Provide examples of standards
- Devices must have secure configuration in place prior to deployment
- Any deviations from defined security configurations must be approved through a change management process and documented. a process must exist to annually review deviations for continued relevance.
- A process messages to regular check configurations at devices in alert the resource custodian of any changes
- Are detailed step-by-step processes that individuals and organizations must follow in specific circumstances
- i.e. building new systems, releasing code to the production environment, responding to security incidents, and etc…
Procedures
- Common procedure doc
- Describes how the organization will perform security monitoring activities, including the possible use of continuous monitoring technology
Monitoring procedures
- Common procedure doc
- Describes how the organization will respond to subpoenas, court orders, and other legitimate request to produce digital evidence
Evidence production procedures
- Common procedure doc
- Describes the frequency in process of applying patches to applications and systems under the organization’s care
Patching procedures
- Provides best practices and recommendations related to a given concept, technology, or task
- Not mandatory and offered as helpful advice
Guidelines
What happens when an organization must deviate from a policy?
The policy framework should lay out the specific requirements for receiving an exception and the individual or committee with authority to approve exceptions
Security and privacy rules that affect Healthcare Providers, Health insurances, and Health Information clearing house
The Health Insurance Portability and Accountability Act (HIPAA)
- Provide detailed rules about the storage, processing, and transmission of credit and debit card information
- Not a law but a contractual obligation it applies to credit card merchants and service providers
The Payment Card Industry Data Security Standard (PCI DSS)
- Covers financial institutions, broadly defined. It requires that those institutions have a formal security program and designate an individual as having overall responsibility for that program.
The Gramm Leach Bliley Act (GLBA)