Documents: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 37: | Line 37: | ||
:[[Business Application Best Practice Configuration Samples:|'''Business Application Best Practice Configuration Samples''']] | :[[Business Application Best Practice Configuration Samples:|'''Business Application Best Practice Configuration Samples''']] | ||
:This section provides configuration samples and recommendations for applying secure best practices to various business applications.<br> | :This section provides configuration samples and recommendations for applying secure best practices to various business applications.<br> | ||
<br> | |||
:[[Enterprise Open-Source Policy Sample:|'''Enterprise Open-Source Policy Sample''']] | |||
:This section provides sample guidance and recommendations for applying an Enterprise level Open-Source usage Policy.<br> | |||
<br> | <br> | ||
--[[User:Mdpeters|Mdpeters]] 10:54, 16 November 2006 (EST) | --[[User:Mdpeters|Mdpeters]] 10:54, 16 November 2006 (EST) | ||
---- | ---- |
Revision as of 13:14, 7 April 2007
Sample Templates
Adaptive Policy Best Practices
This section provides sample policy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based information security program.
- Adaptive Best Practices Policy Samples
- This section provides Policy Framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based Information Security Program.
- Sarbanes-Oxley Policy Samples
- Section 404 of the Sarbanes-Oxley Act (SOX) requires companies to document their financial and Information Technology (IT) controls and attest to the effectiveness of the controls on an annual basis. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an risk management-based Information Security Program that complies with SOX Section 404.
- Gramm-Leach-Bliley Policy Samples
- The Gramm-Leach-Bliley Act (GLBA) mandates that financial organizations take specific actions to protect the security (and privacy) of customer information. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information Security Program that complies with GLBA.
- Health Insurance Portability and Accountability Policy Samples
- Subpart C Section 164.306 (c) of the Health Insurance Portability and Accountability Act (HIPAA) requires covered entities to comply with specific security standards with respect to all electronic protected health information. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information Security Program that complies with HIPAA.
- International Organization for Standardization Security Standard Policy Samples
- The International Organization for Standardization Security Standard (ISO 17799) is an internationally recognized information Security Management standard consisting of security clauses, controls, and objectives comprising best practices in information security. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.
--Mdpeters 08:14, 14 July 2006 (EDT)
Adaptive Technology Best Practices
This section provides sample policy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based information security program.
- Database Application Best Practice Configuration Samples
- This section provides configuration samples and recommendations for applying secure best practices to database applications.
- Operating System Best Practice Configuration Samples
- This section provides configuration samples and recommendations for applying secure best practices to various operating systems.
- Business Application Best Practice Configuration Samples
- This section provides configuration samples and recommendations for applying secure best practices to various business applications.
- Enterprise Open-Source Policy Sample
- This section provides sample guidance and recommendations for applying an Enterprise level Open-Source usage Policy.
--Mdpeters 10:54, 16 November 2006 (EST)