Security Policies 5.1 Flashcards
High Level Strategy for Security Policies
- Very broad policies
- Focuses mostly on Data Storage Requirements and Security Event Procedures.
Detailed Security Goals
- These policies are focused on more smaller details
- Ex., Appropriate WiFi usage or requirements for remote access
Primary Focus of Security Policies
- Answers the “What” and “Why”
Information Security Policies
- A master list of all the policies to maintain the up time and security of a network.
Security Policy
- Can be mandated
- Detail security procedures.
- List out the roles and responsibilities involved with security.
- It is up to organization to enforce these policies.
Acceptable Use Policy (AUP)
- Outlines what the organization considers to be appropriate use of its resources.
- Can protect the organization from any legal liability.
Business Continuity Plan (BCP)
- Represents the planning and advanced policy decisions to ensure the con
Challenge of a BCP
- There must be planning done before the particular issue occurs.
Disaster Recovery Plan (DRP)
- Defines the data, resources, and steps necessary required to restore critical organizational processes.
Types of Disasters
- Natural disasters, such as weather
- Technology or system failures
- Human created disasters
Comprehensive Plan for DRP
- Recovery location
- Data recovery method
- Application restoration
- IT team and employee availability
Types of Security Incidents to Consider
- Malware
- DDoS attacks
- Theft of confidential information
Incident Response Team
- A specialized group with knowledge in how to address the various incidents.
Incident Response Roles - IT Security Management
- Corporate support
- Obtains the right people and resources to address the incident
Incident Response Roles - Compliance Officer
- Intricate knowledge of compliance rules
- Makes sure that all the data and systems are compliant with the required mandates.
Incident Response Roles - User Community
- Standard individuals using the system
- They can see everything that occurred during the security event.
Incident Response Roles - Technical Staff
- The ones directly addressing the incident
National Institute of Standards and Technology (NIST SP800-61)
- Provides recommended strategies on how to handle security incidents.
- Informs government and other organizations
NIST Incident Response LifeCycle
- Preparation
- Detection and analysis
- Containment, eradication, and recovery
- Post-incident activity
Software Development LifeCycle (SDLC)
- Processes and procedures employed to develop software
Goal of SDLC
- Move from the idea phase to development of an application
Ways to Get From Idea to App
- Customer requirements
- Keep the process on schedule
- Stay on budget
Waterfall Lifecycle
- A linear lifecycle
- Designed to be a faster way of developing applications
Agile Lifecycle
- A longer and slower paced lifecycle