Security Policy:: Difference between revisions
No edit summary |
|||
(3 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
== | ==Information Security Policy== | ||
The objective of this category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, regulations and private certificatory requirements.<br> | |||
<br> | <br> | ||
==Information security policy document== | |||
One or more information security policy documents should be approved by management, and published and communicated to all employees and relevant external parties.<br> | |||
<br> | <br> | ||
:1. [[Sample Information Security Program Charter:|'''Sample ISO Information Security Program Charter''']]<br> | '''Control includes:'''<br> | ||
<br> | |||
* Overall information security objectives and scope, including statement of management intent, supporting goals and principles of information security<br> | |||
* Listing of identified authorities and requirements that condition or control information security activities, including an explanation or listing of security policies, principles, standards and compliance requirements of importance to the organization<br> | |||
* Framework for setting control objectives and controls themselves, including a structure for risk assessment and risk management<br> | |||
* Definitions of general and specific responsibilities for information security management<br> | |||
* References to documents that support or underpin the policy<br> | |||
* Retention of all versions of the policy, and any associated documentation, for at least six years<br> | |||
<br> | |||
<blockquote style="background: darkkhaki; padding: 1em; margin-left: 0.5em;"> | |||
<font color=green>'''HORSE FACTS:'''</font> Six-year retention requirement derived from HIPAA 164.316(a)(2)(i).</blockquote> | |||
===Review of information security policies=== | |||
The information security policy or policies should be reviewed at planned intervals, and when significant changes in the external environment occur, to ensure its continued suitability, adequacy and effectiveness.<br> | |||
<br> | |||
'''Control includes:'''<br> | |||
<br> | |||
* Solicitation and integration of feedback from all interested parties<br> | |||
* Independent, third-party reviews as appropriate<br> | |||
* Recommendations and requirements of relevant authorities<br> | |||
* Consideration of trends in threats and vulnerabilities, and available technologies for counter-measures and mitigations<br> | |||
* Consideration of trends in compliance requirements of federal, state, local and private certificatory authorities<br> | |||
* Consideration of trends in and anticipated changes to the organizational environment, business circumstances, and resource availability<br> | |||
* Historical data on information security incidents at the organization itself and at peer institutions<br> | |||
* A formal record of the review(s) undertaken for plan development and refinement, and their outcomes<br> | |||
* Retention of this record for at least six years<br> | |||
<br> | |||
<blockquote style="background: darkkhaki; padding: 1em; margin-left: 0.5em;"> | |||
<font color=green>'''HORSE FACTS:'''</font> Six-year retention requirement derived from HIPAA 164.316(a)(2)(i).</blockquote> | |||
==Other security policy== | |||
This category aims to assure that other, non-information-directed security policies are congruent in intent and effect. | |||
===Coordination with other security policies=== | |||
Other non-information security policy or policies should be reviewed at planned intervals, and when significant changes in the external environment occur, to ensure compatibility with information security efforts.<br> | |||
<br> | |||
'''Control includes:'''<br> | |||
<br> | |||
* Identification of all other relevant policies<br> | |||
* Inclusion of the representatives from the areas responsible for such policies in the periodic review of information security policy<br> | |||
<br> | |||
==Information Security Policy Samples== | |||
ISO 17799 section 5.1 defines the information security policy objective "to provide management direction and support for information security in accordance with business requirements and relevant laws and regulations". Section 5.1.1 requires management to approve and publish an information security policy document. Section 5.1.2 requires the policy to be reviewed periodically or when significant changes occur.<br> | |||
<br> | |||
This section of the wiki provides templates for an Information Security Program Charter and supporting policies that are required to comply with ISO Security Policy objectives.<br> | |||
<br> | |||
:1: [[Sample Information Security Program Charter:|'''Sample ISO Information Security Program Charter''']]<br> | |||
:The Information Security Program Charter is required to comply with ISO Security Policy objectives and serves as the capstone document for the Information Security Program that empowers the Program to manage Information Security-related business risks.<br> | :The Information Security Program Charter is required to comply with ISO Security Policy objectives and serves as the capstone document for the Information Security Program that empowers the Program to manage Information Security-related business risks.<br> | ||
<br> | <br> | ||
:2 | :2: [[Sample Asset Identification and Classification Policy:|'''Sample ISO Asset Identification and Classification Policy''']]<br> | ||
:The Asset Identification and Classification Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to properly classify and label information assets.<br> | :The Asset Identification and Classification Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to properly classify and label information assets.<br> | ||
<br> | <br> | ||
:3 | :3: [[Sample Asset Protection Policy:|'''Sample ISO Asset Protection Policy''']]<br> | ||
:The Asset Protection Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to ensure the security, confidentiality, itegrity, and availability of information, as well as protect against threats or unauthorized access to such information.<br> | :The Asset Protection Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to ensure the security, confidentiality, itegrity, and availability of information, as well as protect against threats or unauthorized access to such information.<br> | ||
<br> | <br> | ||
:4 | :4: [[Sample Asset Management Policy:|'''Sample ISO Asset Management Policy''']]<br> | ||
:The Asset Management Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for managing the Information Technology infrastructure, including networks, systems, and applications that store, process and transmit sensitive information throughout the entire life cycle.<br> | :The Asset Management Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for managing the Information Technology infrastructure, including networks, systems, and applications that store, process and transmit sensitive information throughout the entire life cycle.<br> | ||
<br> | <br> | ||
:5 | :5: [[Sample Acceptable Use Policy:|'''Sample ISO Acceptable Use Policy''']]<br> | ||
:The Acceptable Use Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring the appropriate business use of electronic communications resources.<br> | :The Acceptable Use Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring the appropriate business use of electronic communications resources.<br> | ||
<br> | <br> | ||
:6 | :6: [[Sample Vulnerability Assessment and Management Policy:|'''Sample ISO Vulnerability Assessment and Management Policy''']]<br> | ||
:The Vulnerability Assessment and Management Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring vulnerabilty assessment activities are performed and vulnerabilities mitigation efforts are properly managed.<br> | :The Vulnerability Assessment and Management Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring vulnerabilty assessment activities are performed and vulnerabilities mitigation efforts are properly managed.<br> | ||
<br> | <br> | ||
:7 | :7: [[Sample Threat Assessment and Monitoring Policy:|'''Sample ISO Threat Assessment and Monitoring Policy''']]<br> | ||
:The Threat Assessment and Monitoring Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to ensure periodic threat assessment and ongoing threat monitoring and incident response activities are performed.<br> | :The Threat Assessment and Monitoring Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to ensure periodic threat assessment and ongoing threat monitoring and incident response activities are performed.<br> | ||
<br> | <br> | ||
:8 | :8: [[Sample Security Awareness Policy:|'''Sample ISO Security Awareness Policy''']]<br> | ||
:The Security Awareness Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring that a formal Security Awareness Program is established, as well ensuring that Information Security objectives and requirements are properly communicated and understood.<br> | :The Security Awareness Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring that a formal Security Awareness Program is established, as well ensuring that Information Security objectives and requirements are properly communicated and understood.<br> | ||
<br> | <br> | ||
==References== | |||
ISO-27002:2005 5.1.1<br> | |||
HIPAA 164.316(a-b)<br> | |||
PCI-DSS:2005 12<br> | |||
ISO-27002:2005 5.1.2<br> | |||
HIPAA 164.308(a)(8)<br> | |||
HIPAA 164.316(a-b)<br> | |||
PCI-DSS:2005 12<br> | |||
ISO-27002:2005 5.1.2<br> | |||
==See Also== | |||
* ISO 17799/27002 - Code of Practice for Information Security Management |
Latest revision as of 13:25, 23 May 2007
Information Security Policy
The objective of this category is to provide management direction and support for information security in accordance with business requirements and all relevant laws, regulations and private certificatory requirements.
Information security policy document
One or more information security policy documents should be approved by management, and published and communicated to all employees and relevant external parties.
Control includes:
- Overall information security objectives and scope, including statement of management intent, supporting goals and principles of information security
- Listing of identified authorities and requirements that condition or control information security activities, including an explanation or listing of security policies, principles, standards and compliance requirements of importance to the organization
- Framework for setting control objectives and controls themselves, including a structure for risk assessment and risk management
- Definitions of general and specific responsibilities for information security management
- References to documents that support or underpin the policy
- Retention of all versions of the policy, and any associated documentation, for at least six years
HORSE FACTS: Six-year retention requirement derived from HIPAA 164.316(a)(2)(i).
Review of information security policies
The information security policy or policies should be reviewed at planned intervals, and when significant changes in the external environment occur, to ensure its continued suitability, adequacy and effectiveness.
Control includes:
- Solicitation and integration of feedback from all interested parties
- Independent, third-party reviews as appropriate
- Recommendations and requirements of relevant authorities
- Consideration of trends in threats and vulnerabilities, and available technologies for counter-measures and mitigations
- Consideration of trends in compliance requirements of federal, state, local and private certificatory authorities
- Consideration of trends in and anticipated changes to the organizational environment, business circumstances, and resource availability
- Historical data on information security incidents at the organization itself and at peer institutions
- A formal record of the review(s) undertaken for plan development and refinement, and their outcomes
- Retention of this record for at least six years
HORSE FACTS: Six-year retention requirement derived from HIPAA 164.316(a)(2)(i).
Other security policy
This category aims to assure that other, non-information-directed security policies are congruent in intent and effect.
Coordination with other security policies
Other non-information security policy or policies should be reviewed at planned intervals, and when significant changes in the external environment occur, to ensure compatibility with information security efforts.
Control includes:
- Identification of all other relevant policies
- Inclusion of the representatives from the areas responsible for such policies in the periodic review of information security policy
Information Security Policy Samples
ISO 17799 section 5.1 defines the information security policy objective "to provide management direction and support for information security in accordance with business requirements and relevant laws and regulations". Section 5.1.1 requires management to approve and publish an information security policy document. Section 5.1.2 requires the policy to be reviewed periodically or when significant changes occur.
This section of the wiki provides templates for an Information Security Program Charter and supporting policies that are required to comply with ISO Security Policy objectives.
- 1: Sample ISO Information Security Program Charter
- The Information Security Program Charter is required to comply with ISO Security Policy objectives and serves as the capstone document for the Information Security Program that empowers the Program to manage Information Security-related business risks.
- 2: Sample ISO Asset Identification and Classification Policy
- The Asset Identification and Classification Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to properly classify and label information assets.
- 3: Sample ISO Asset Protection Policy
- The Asset Protection Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to ensure the security, confidentiality, itegrity, and availability of information, as well as protect against threats or unauthorized access to such information.
- 4: Sample ISO Asset Management Policy
- The Asset Management Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for managing the Information Technology infrastructure, including networks, systems, and applications that store, process and transmit sensitive information throughout the entire life cycle.
- 5: Sample ISO Acceptable Use Policy
- The Acceptable Use Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring the appropriate business use of electronic communications resources.
- 6: Sample ISO Vulnerability Assessment and Management Policy
- The Vulnerability Assessment and Management Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring vulnerabilty assessment activities are performed and vulnerabilities mitigation efforts are properly managed.
- 7: Sample ISO Threat Assessment and Monitoring Policy
- The Threat Assessment and Monitoring Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for establishing specific standards to ensure periodic threat assessment and ongoing threat monitoring and incident response activities are performed.
- 8: Sample ISO Security Awareness Policy
- The Security Awareness Policy is required to comply with ISO Security Policy objectives and builds on the mission statement established in the Information Security Program Charter by defining objectives for ensuring that a formal Security Awareness Program is established, as well ensuring that Information Security objectives and requirements are properly communicated and understood.
References
ISO-27002:2005 5.1.1
HIPAA 164.316(a-b)
PCI-DSS:2005 12
ISO-27002:2005 5.1.2
HIPAA 164.308(a)(8)
HIPAA 164.316(a-b)
PCI-DSS:2005 12
ISO-27002:2005 5.1.2
See Also
- ISO 17799/27002 - Code of Practice for Information Security Management