Finals Lesson 2 Part 2 Flashcards
A mature security program will require the following policies and procedures:
- Acceptable Use Policy (AUP)
- Access Control Policy (ACP)
- Change Management Policy
- Information Security Policy
- Incident Response (IR) Policy
- Remote Access Policy
- Email/Communication Policy
- Disaster Recovery Policy
- Business Continuity Plan (BCP)
An ____ stipulates the constraints and practices that an employee using organizational IT assets must agree to in order to access to the corporate network or the internet.
Acceptable Use Policy (AUP)
It is standard on boarding policy for new employees. They are given this to read and sign before being granted a network ID. It is recommended that and organizations IT, security, legal and HR departments discuss what is included in this policy. An example that is available for fair use can be found at SANS.
Acceptable Use Policy (AUP)
The _____ outlines the access available to employees in regards to an organization’s data and information systems. Some topics that are typically included in the policy are access control standards such as NIST’s Access Control and Implementation Guides.
Access Control Policy (ACP)
Other items covered in this policy are standards for user access, network access controls, operating system software controls and the complexity of corporate passwords. Additional supplementary items often outlined include methods for monitoring how corporate systems are accessed and used; how unattended workstations should be secured; and how access is removed when an employee leaves the organization. An excellent example of this policy is available at IAPP.
Access Control Policy (ACP)
It refers to a formal process for making changes to IT, software development and security services/operations.
Change Management Policy
The goal of a _______ is to increase the awareness and understanding of proposed changes across an organization, and to ensure that all changes are conducted methodically to minimize any adverse impact on services and customers. A good example of an IT change management policy available for fair use is at SANS.
Change Management Policy; change management program
An organization’s ________ are typically high-level policies that can cover a large number of security controls. The primary information security policy is issued by the company to ensure that all employees who use information technology assets within the breadth of the organization, or its networks, comply with its stated rules and guidelines.
Information Security Policy
This policy is designed for employees to recognize that there are rules that they will be held accountable to with regard to the sensitivity of the corporate information and IT assets.
Information Security Policy
The_______ is an organized approach to how the company will manage an incident and remediate the impact to operations. It’s the one policy CISOs hope to never have to use.
Incident Response (IR) Policy
The goal of this policy is to describe the process of handling an incident with respect to limiting the damage to business operations, customers and reducing recovery time and costs.
Incident Response (IR) Policy
The _____ is a document which outlines and defines acceptable methods of remotely connecting to an organization’s internal networks. I have also seen this policy include addendums with rules for the use of BYOD assets.
Remote Access Policy
This policy is a requirement for organizations that have dispersed networks with the ability to extend into insecure network locations, such as the local coffee house or unmanaged home networks. An example of this is available at SANS.
Remote Access Policy
A company’s ______ is a document that is used to formally outline how employees can use the business’ chosen electronic communication medium. I have seen this policy cover email, blogs, social media and chat technologies.
Email/Communication Policy;
email policy
The primary goal of this policy is to provide guidelines to employees on what is considered the acceptable and unacceptable use of any corporate communication technology. An example of this is available at SANS.
Email/Communication Policy