Documents

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to: navigation, search

Looking for a comprehensive set of enterprise policies to develop on your own? How about a complete set that are customized to your needs delivered in minutes? Take a look at The Policy Machine - a Lazarus Alliance service.

Policymachine-170x170.png

Work smarter, not harder!

Adaptive Policy Best Practices

This section provides sample policy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based information security program.

Adaptive Best Practices Policy Samples
This section provides Policy Framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based Information Security Program.


Sarbanes-Oxley Policy Samples
Section 404 of the Sarbanes-Oxley Act (SOX) requires companies to document their financial and Information Technology (IT) controls and attest to the effectiveness of the controls on an annual basis. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an risk management-based Information Security Program that complies with SOX Section 404.


Gramm-Leach-Bliley Policy Samples
The Gramm-Leach-Bliley Act (GLBA) mandates that financial organizations take specific actions to protect the security (and privacy) of customer information. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information Security Program that complies with GLBA.


Health Insurance Portability and Accountability Policy Samples
Subpart C Section 164.306 (c) of the Health Insurance Portability and Accountability Act (HIPAA) requires covered entities to comply with specific security standards with respect to all electronic protected health information. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information Security Program that complies with HIPAA.


Payment Card Industry Policy Samples
In 2004, the original VISA CISP requirements were incorporated into an industry standard known as as the Payment Card Industry (PCI) Data Security Standard. This new consolidated standard is endorsed by VISA.


International Organization for Standardization Security Standard Policy Samples
The International Organization for Standardization Security Standard (ISO 17799) is an internationally recognized information Security Management standard consisting of security clauses, controls, and objectives comprising best practices in information security. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.


Adaptive Technology Best Practices

This section provides sample policy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based information security program.

Database Application Best Practice Configuration Samples
This section provides configuration samples and recommendations for applying secure best practices to database applications.


Operating System Best Practice Configuration Samples
This section provides configuration samples and recommendations for applying secure best practices to various operating systems.


Infrastructure System Best Practice Configuration Samples
This section provides configuration samples and recommendations for applying secure best practices to infrastructure elements.


Business Application Best Practice Configuration Samples
This section provides configuration samples and recommendations for applying secure best practices to various business applications.


Enterprise Open-Source Policy Guidance
This section provides sample guidance and recommendations for constructing and applying an Enterprise level Open-Source usage Policy.


See Also

Business to IT Alignment
Legal Technology White Papers

References

NISPOM: National Industrial Security Program Operating Manual
DCIDs: Director of Central Intelligence Directives

  • In specific examine section six (6) under security.