Security Programme management and oversight 5.1 Flashcards
Security Policy Guidelines.
What rules are you following to provide CIA.
Security Policies answer the what and the why.
Information security policy
A big list of all security related policies.
Acceptable Use Policy
Acceptable Use Policy
Defines what users are able to do with the technology has been provided to them.
Business Continuity
Plan for when technology does not work.
Disaster Recovery plan
It should be ready to respond to disaster
Security Incidents
policy to be able to react to different events.
Incident response team
Specialised team to respond to a security incident.
NIST
National institute of standards and technology.
Incident response lifecycle:
Preparation, Detection, Containment, Post-incident Activity.
SDLC
Systems development cycle
AGILE VS WATERFUL
Change management
Policies which need to be followed in relation to making a change.
Security Standards
A formal definition for using security technologies and processes.
Many standards are already available
ISO (International Organisation for Standardisation).
NIST (National Institute of Standards and Technology)
Passwords
Ensure a specific set of password policies are being used when setting a password.
Access control
Define which access control types are used. Determine which information, at what time.
Physical Security - Standards
Rules and Policies regarding physical security controls.
Encryption - standards
Password storage (Encrypted).
Data encryption standards depending on the state of data.