3 Module 3 20 Aug 2020material I 20 Aug 2020 Module 3
3 Module 3 20 Aug 2020material I 20 Aug 2020 Module 3
3 Module 3 20 Aug 2020material I 20 Aug 2020 Module 3
POLICIES, PROCEDURES,
STANDARDS AND GUIDELINES
Policies, Procedures, Standards and Guidelines
• Information security policies to describe how the organization wants to protect
its information assets.
• After policies are outlined, standards are defined to set the mandatory rules that
will be used to implement the policies.
• Procedures are implementation details;
• Policy is a statement of the goals to be achieved by procedures.
• Some policies can have multiple Guidelines, which are recommendations as to
how the policies can be implemented.
• Finally, information security management, administrators, and engineers create
procedures from the standards and guidelines that follow the policies
Information Security Policies
• foundation of security infrastructure
• Without them, cannot protect
• company from possible lawsuits, lost revenue and bad publicity, not to mention basic security
attacks.
• A security policy is a document or set of documents that describes, at a high level,
the security controls that will be implemented by the company.
• Policies are not technology specific and do three things for an organization
• Reduce or eliminate legal liability to employees and third parties.
• Protect confidential, proprietary information from theft, misuse, unauthorized disclosure or
modification.
• Prevent waste of company computing resources.
Security Policies
• Types
• Technical Security policies: how technology should be configured and used.
• Administrative Security policies: how people (both end users and management) should behave/
respond to security.
• To find the level of security measures that need to be applied, a risk assessment is
mandatory.
Security Policies
• Define what is expected from employees within an organisation w.r.t. information
systems.
• Guide or control the use of systems to reduce the risk to information assets.
• Gives the staff who are dealing with information systems an acceptable use policy,
explaining what is allowed and what not.
SP - Rules and Regulations
• Encryption mechanisms
• Access control devices
• Authentication systems
• Firewalls
• Anti-virus systems
• Websites
• Gateways
• Routers and switches
• Necessity of a security policy
Encryption Mechanisms
Standards and best practices can help the auditor distinguish good security designs from
bad and provide reference architectures to compare
ISO 27000 Series of Standards
• Internationally recognized security control standards for the creation and operations of an
Information Security Management System (ISMS). ISO 17799
• ISO 27001:2005 Information Technology Techniques Information Security Management
Systems.
• Provides the requirements for a security management system in accordance with ISO 27002 best practices.
• ISO 27001 identifies generic technological controls and processes that must be in place if a business wants
to be certified as compliant with the ISO standard.
• The contents of ISO 27001 are:
• ISMS: Establish the ISM, implement and operate, monitor and review, maintain and improve documentation
requirements, control documents and records.
• Management responsibility: Involves commitment, provision of resources and training for awareness and
competence.
• Internal audits: Requirements for conducting audits.
• ISMS improvements: Corrective and preventative actions.
• Annex A: Objectives and controls and checklist.
• Annex B: Organization for economic cooperation, development principles and international standard.
• Annex C: Correspondence between ISO 9001, SIO 14001 and standard.
• Key concept is the Deming Cycle process improvement approach: Plan, Do, Check and Act.
• Continuous improvement cycle was made famous by Dr. W. Edwards Deming whose quality control
techniques methodology is a way to show that a process can be continually improved by learning from
mistakes and monitoring the things done correctly to further refine the capabilities of the system.
The Deming Cycle
• Step 1. Plan: Establish the ISM according to the policies, processes and
objectives of the organization to manage risk.
• Step 2. Do: Implement and operate the ISM.
• Step 3. Check: Audit, assess and review the ISM against policies, objectives
and experiences.
• Step 4. Act: Take action to correct deficiencies identified for continuous
improvement.
ISO 27002:2005 Security Techniques Code of Practice
• Consists of
• international best practices for securing systems.
• provides best practice information about everything from Human Resources security needs to physical security an
• represents the detailed implementation requirements for ISO 27001.
• consists of security controls across all forms of data communication, including electronic, paper and voice.
• details for improving ICT readiness as part of the organization‘s ISMS, helping
• classification should result into an information labelling to indicate whether it is sensitive or critical and
what procedure, which is appropriate for copy, store, transmit or destruction of the information asset.
4. Personnel security
• Human errors, negligence and greed are responsible for most thefts, frauds or misuse of facilities.
• Various proactive measures to be taken are: creation of personnel screening policies, confidentiality
agreements, terms and conditions of employment and information security education and training.
• Alert and well-trained employees who are aware of what to look for can prevent future security
breaches.
5. Physical and environmental security
• Designing a secure physical environment to prevent unauthorized access, damage and interference to
business premises and information is usually the beginning point of any security plan.
• Involves creating physical security perimeter and entry control, secure offices; rooms; facilities,
providing physical access controls and protection devices to minimize risks ranging from fire to
electromagnetic radiation and providing adequate protection to power supplies and data cables are
some of the activities.
• Cost effective design and constant monitoring are two key aspects to maintain adequate physical
security control.
6. Communications and operations management
• Access to information and business processes should be controlled on the business and security
requirements
• include defining
• access control policy and rules; user access management; user registration; privilege management; user
password use and management; review of user access rights; network access controls; enforcing path from
user terminal to computer; user authentication; node authentication; segregation of networks; network
connection control; network routing control; operating system access control; user identification and
authentication; use of system utilities; application access control; monitoring system access and use and
ensuring information security when using mobile computing and tele-working facilities.
8. System development and maintenance
10. Compliance
• It is essential that strict adherence is observed to the provision of national and international IT laws,
pertaining to Intellectual Property Rights (IPR), software copyrights, safeguarding of organizational
records, data protection and privacy of personal information, prevention of misuse of information
processing facilities, regulation of cryptographic controls and collection of evidence.
BS 7799 (ISO 17799) and "It’s" relevance to Indian
Companies
• Attacks and theft that happen on corporate websites are high and is usually kept
under "strict" secrecy to avoid embarrassment from business partners, investors,
media and customers.
• Huge losses are sometimes un-audited and the only solution is to involve a model
where one can see a long run business led approach to Information Security
Management.
• BS 7799 (ISO 17799) consists of 127 best security practices (covering 10 Domains
which was discussed above) which Indian companies can adopt to build their Security
Infrastructure.
• Even if a company decides not go in for the certification, BS 7799 (ISO 17799) model
helps companies maintain IT security through ongoing, integrated management of
policies and procedures, personnel training, selecting and implementing effective
controls, reviewing their effectiveness and improvement.
• Additional benefits of an ISMS are improved customer confidence, a competitive
edge, better personnel motivation and involvement, and reduced incident impact.
• Ultimately leads to increased profitability
Security Standards Organizations
Internet Corporation for Assigned Names and Numbers (ICANN)
• To reach another person on the Internet you have to type an address into your
computer - a name or a number.
• That address has to be unique so computers know where to find each other.
• ICANN coordinates these unique identifiers across the world.
• It promotes competition and develops policy on the Internet‘s unique
identifiers.
• This is commonly termed ―universal resolvability‖ and means that wherever we
are on the network – and hence the world – that we receive the same
predictable results when we access the network.
International Organization for Standardization (ISO)