Information Security Policies and Standards

15
Information Security Policies and Standards Ari Moesriami Institut Teknologi Telkom Bandung [email protected]

description

Presented by Ari Moesriami, Institut Teknologi Telkom Bandung [email protected]

Transcript of Information Security Policies and Standards

Page 1: Information Security Policies and Standards

Information Security Policies and Standards

Ari Moesriami Institut Teknologi [email protected]

Page 2: Information Security Policies and Standards

The challenges

Define security policies and standards Measure actual security against policy Report violations to policy Correct violations to conform with

policy Summarize policy compliance for the

organization

Page 3: Information Security Policies and Standards

Where do we start?

Page 4: Information Security Policies and Standards

The Foundation of Information Security

Page 5: Information Security Policies and Standards

The Information Security Functions

Page 6: Information Security Policies and Standards

Managing Information Security

Page 7: Information Security Policies and Standards

Policies

Page 8: Information Security Policies and Standards

The Purpose

Provide a framework for the management of security

across the enterprise

Page 9: Information Security Policies and Standards

Definitions

Policies High level statements that provide guidance

to workers who must make present and future decision

Standards Requirement statements that provide

specific technical specifications Guidelines

Optional but recommended specifications

Page 10: Information Security Policies and Standards

Security PolicyAccess to

network resource will be granted

through a unique user ID and password

Passwords should include one non-alpha and not found in dictionary

Passwords will be 8

characters long

Page 11: Information Security Policies and Standards

Elements of Policies

Set the tone of Management Establish roles and responsibility Define asset classifications Provide direction for decisions Establish the scope of authority Provide a basis for guidelines and

procedures Establish accountability Describe appropriate use of assets Establish relationships to legal

requirements

Page 12: Information Security Policies and Standards

Policies should……

Clearly identify and define

the information

security goals and the goals

of the institution/unit/company.

Page 13: Information Security Policies and Standards

The Ten-Step Approach

Page 14: Information Security Policies and Standards

Policy Hierarchy

Governance Policy

Access ControlPolicy

User ID Policy

AccessControl

AuthenticationStandard

PasswordConstruction

Standard

User IDNaming Standard

StrongPassword

ConstructionGuidelines

Page 15: Information Security Policies and Standards