Policies and Procedures Flashcards
Policies
Defines the role of security in an organisation and establishes the desired end state of the security program
They may be regulatory, advisory or informative.
Organisational Policies
Provide general direction and goals, a framework to meet business goals, and define the roles, responsibilities and terms.
System-Specific Policies
Address the security of a specific technology, application, network or computer system
Issue-Specific Policies
Built to address a specific security issue, such as email privacy, employee termination, procedures, or other specific issues.
Standards
Standards are used to implement a policy in an organisation.
E.g.: Mandatory actions, steps or rules to achieve a level of security.
Baselines
Baselines are created as reference points which are documented for use a method of comparison during an analysis conducted in the future.
E.g.: A server baseline configuration.
Guidelines
Guidelines are used to recommend actions. Guiding actions that can be broken as the situation necessitates.
E.g.: All employees get 1TB of storage for personal files on the local network.
Procedures
Detailed step-by-step instructions that are created to ensure personnel can perform a given action.
E.g.: Creating a new user.
Sensitive Data
Any information that can result in a loss of security, or a loss of advantage to a company if used by an unauthorized individual.
What are the four common “Commercial Data Classifications”?
- Public (No impact to a company if released)
- Sensitive (Might have a minimal impact if released)
- Private (Data that should only be used in the organisation)
- Confidential (Trade secrets, IP, source code and other types of data that would affect the business if disclosed).
What are the five common “Government Data Classifications”?
Unclassified
Sensitive but Unclassified
Confidential
Secret
Top Secret
What are the five common “Government Data Classifications”?
Unclassified (Can be released to the public)
Sensitive but Unclassified (Items that wouldn’t hurt national security, but could impact those whose data is contained in it)
Confidential (Seriously affect the government on disclosure,
Secret (Serious damage to national security)
Top Secret (Gravely damage national security if known to those who are not authorized to see the data)
Data Owner
A senior or executive role that has ultimate responsibility for the CIA of the asset.
The data owner is responsible for labelling the asset and ensuring that is it protected with appropriate controls.
Data Steward
A role focused on the quality of the data and associated meta data
Data Custodian
A role responsible for handling the management of the system on which the data assets are stored. (E.g.: a system administrator)