Module 3 - INFOSEC Management Flashcards
What are the 6 Ps of INFOSEC management?
- Planning
- Policy
- Programs
- Protection
- People
- Project management
Sets the long-term direction to be taken by the organization and each of its component parts
Strategic planning
The application of the principles and practices of corporate governance to the information security function
Information Security Governance
The ISO 27000 series standard for Governance of Information Security—specifies six high-level “action-oriented” information security governance principles:
- Establish organization-wide information security.
- Adopt a risk-based approach.
- Set the direction of investment decisions.
- Ensure conformance with internal and external requirements.
- Foster a security-positive environment.
- Review performance in relation to business outcomes.
Information security governance goals(5):
- Strategic alignment of information security with business strategy to support organizational objectives
- Risk management
- Resource management
- Performance measurement
- Value delivery
Policies should (3):
- never contradict law
- Be able to stand up in court
- Be properly administered.
The least expensive controls to execute but most difficult to implement properly.
Security policies
A detailed statement of what must be done to comply with policy, sometimes viewed as the rules governing policy compliance, is known as a(n) _____.
Standard
Functions as organizational law that dictates acceptable and unacceptable behavior
Policy
Management must define three types of security policy:
- Enterprise information security policies
- Issue-specific security policies
- Systems-specific security policies
EISP typically addresses compliance in two areas:
- Ensure meeting of requirements to establish program and assigning responsibilities therein to various organizational components
- Use of specified penalties and disciplinary action
Sets strategic direction, scope, and tone for all security efforts within the organization
Enterprise INFOSEC Policy (EISP)
EISP elements should include(4):
- Overview of corporate philosophy on security
- Information on the structure of the organization and people in information security roles
- Fully articulated responsibilities for security shared by all members of the organization
- Fully articulated responsibilities for security unique to each role in the organization
The Issue Specific Security Policy (ISSP)(3):
- Addresses specific areas of technology
- Requires frequent updates
- Contains statement on the organization’s position on a specific issue
Access control lists (ACLs) are an example of what kind of policy?
Systems-Specific Policy (SysSP)
For policies to be effective and legally defensible, the following must be done properly(6):
- Development
- Dissemination
- Reading
- Comprehension
- Compliance
- Enforcement
Development
They must be written using industry-accepted practices and formally approved by management.