Security Policies Standards and Procedures
These documents have to exist as a separate entity because they each perform a different specialized function
Benefits of separation
Not all users need to know the security standards, baselines, guidelines, and procedures for all security classification levels
When changes occur, it is easier to update and redistribute only the affected material
Security Policies
Security policy
Top tier of the formalization
document that defines the scope of security needed by the organization and discusses the assets that require protection and the extent to which security solutions should go to provide the necessary protection
What it does
Defines the main security objectives
Outlines the security framework of an organization
Identifies the major functional areas of data processing
Defines all relevant terminology
What it is used for
To assign responsibilities
To define roles
Specify audit requirements
Outline enforcement processes
Indicate compliance requirements
Define acceptable risk levels
Types of Security policies
Organizational security policy
Focuses on issues relevant to every aspect of an organization
Issue-specific security policy
Focuses on specific network service, department, function, or other aspect that is distinct from the rest of the organization
System-specific security policy
Individual systems or types of systems
Prescribes approved hardware and software
Outlines methods for locking down a system
Categories of security policies
Regulatory policy
Required whenever industry or legal standards are applicable
Have to be followed and outlines the procedures that should be used to elicit compliance
Advisory policy
Behaviors and activities that are acceptable and defines consequences of violations
Most policies are advisory
Informative policy
Provide information or knowledge about a specific subject, such as company goals, mission statements, or how the organization interacts with partners and customers
Provides support, research or background information
Acceptable use policy
Designed to assign security roles within the organization
Ensure the responsibilities tied to those roles
Failure to comply with the policy can result in job action warnings, penalties or termination.
Security Standards, Baselines, and Guidelines
Standards
Define compulsory requirements for the use of hardware, software, technology, and security controls
Tactical documents that define steps or methods to accomplish the goals
Baseline
Defines a minimum level of security that every system throughout the organization must meet
More operationally focused
Takes the goals of a security policy and the requirements of the standards and defines them specifically in the baseline as a rule against which to implement and compare IT systems
Usually system specific
Guidelines
Offers recommendations on how standards and baselines are implemented
Serves as an operational guide for both security professionals and users
State which security mechanisms should be deployed instead of prescribing a specific product or control
Outline methodologies and include suggested actions
Not obligatory
Security Procedures
Procedure / Standard Operating Procedure (SOP)
Detailed, step-by-step how-to document that describes exact actions necessary to implement a specific security mechanism, control, or solution
Purpose
Ensure the integrity of business processes
All activities should be in compliance with policies, standards and guidelines
Ensure standardization of security across all systems
Last updated