Identifying Security Compliance Measures Flashcards
What is Security Compliance?
The adherence to rules, regulations or practises that are related to the protection of assets that are established by a specific authority.
What are Assets?
Assets are anything that is considered to have Value.
E.G. Computer hardware/software People, Buildings and data.
Compliance requirements (authority) normally comes from:
The organisation, government or industry
What is Security policies?
A set of documents that outline the physical and information security requirements for an organisation. The goal of a security policy is to protect organisations resources.
Give Examples of Security Policies
Password Policy
Acceptable Use Policy (AUP)
Internet Usage Policy (Can overlap with AUPs)
Define: Password Policy
A security policy to create a strong/complex password to prevent the possibilities of being hacked.
What is Acceptable Use Policy (AUP)
A security policy that govern how individuals or organisations can use a particular system or resource.
Why do we have AUPs?
An AUP is put in place to protect the security and integrity of the system or resource and ensure that users behave in a responsible and ethical manner.
Define: Internet Usage Policy
A security policy that outlines how users can use the internet in a workplace or within an organisation. (Can overlap with AUPs)
What does AUP Stand for?
Acceptable Use Policy
What does PII Stand for?
Personally Identifiable Information
What is PII? Give examples
It is data that can be used to identify a specific person, such as Social Security numbers, passport numbers, and combinations of data, such as a full name and date of birth.
What does PHI Stand for?
Protected Health Information
What is PHI? Give examples
Information that is individually identifiable and maintained by a health care provider, health plan, or health care clearinghouse that is covered by the mandates in the Health Insurance Portability and Accountability Act (HIPAA).
Examples of PHI can be:
* Medical Records
* Health Insurance Information
* Test Results
* Prescription Information
* Medical Images
* Family history
What are Facility Policies?
Facility Policies are a set of documents that specify how employees and visitors can access an organization’s physical premises.
Facility policies can include Physical barriers to manage access like guardhouses and locked doors.
Identification of authorized individuals can include badges for employees and visitors, keys for authorized employees, etc.
Incident Reporting
Security incident reports are an important tool for managing security incidents and improving security in the future. They help to identify vulnerabilities and gaps in security, allowing organizations to take proactive steps to prevent future incidents. This can include a description of the impact of the incident, loss of data, or disruption to operations.
If there are no formal security policy is in place, what can you refer to?
If there are no formal security policies in place you can refer to:
* The Employee handbook
* Network user guide or AUP
* HR department
* IT department
* Information security (InfoSec) department
* Legal department
* Health information management department
* Website
What are the Consequences of Non-Compliance with Organizational Requirements?
This can vary from organization to organization. Dependent on the severity of the violation. Can range from verbal warning to demotion, pay reduction or termination. Should be clearly outlined and available to employees. Consequences should be explained fully to all staff so that there is no misunderstandings.
Scenario: You work at That’s Cheezy Cheese Emporium. Company executives are concerned about the security of organizational assets and customer data. You are on the team that is developing a comprehensive security policy for the organization.
At the first committee meeting, it is decided that the team should establish a process for developing the security policy. What do you think should be the first step?
A good first step would be to collect and review any exiting organisations documentation to determine what security requirements already exist.
A thorough risk assessment is an essential first step in developing an effective security policy. It provides a foundation for understanding the organization’s security needs and developing policies and procedures that are tailored to its unique risks and requirements.
In which type of document would you expect to include rules for entering restricted areas of the company’s central building?
A. AUP
B. Facility policy
C. Password policy
D. Internet usage policy
B