Documents: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
No edit summary
Line 29: Line 29:
:[[Database Application Best Practice Configuration Samples:|'''Database Application Best Practice Configuration Samples''']]
:[[Database Application Best Practice Configuration Samples:|'''Database Application Best Practice Configuration Samples''']]
:This section provides configuration samples and recommendations for applying secure best practices to database applications.<br>
:This section provides configuration samples and recommendations for applying secure best practices to database applications.<br>
<br>
:[[Operating System Best Practice Configuration Samples:|'''Operating System Best Practice Configuration Samples''']]
:This section provides configuration samples and recommendations for applying secure best practices to various operating systems.<br>
<br>
:[[Business Application Best Practice Configuration Samples:|'''Business Application Best Practice Configuration Samples''']]
:This section provides configuration samples and recommendations for applying secure best practices to various business applications.<br>
<br>
<br>
--[[User:Mdpeters|Mdpeters]] 10:54, 16 November 2006 (EST)
--[[User:Mdpeters|Mdpeters]] 10:54, 16 November 2006 (EST)
----
----

Revision as of 16:04, 16 November 2006

Sample Policy Templates


Illustration one of one.



Adaptive Best Practices This section provides sample policy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based information security program.

Adaptive Best Practices Policy Samples
This section provides Policy Framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based Information Security Program.


Sarbanes-Oxley Policy Samples
Section 404 of the Sarbanes-Oxley Act (SOX) requires companies to document their financial and Information Technology (IT) controls and attest to the effectiveness of the controls on an annual basis. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an risk management-based Information Security Program that complies with SOX Section 404.


Gramm-Leach-Bliley Policy Samples
The Gramm-Leach-Bliley Act (GLBA) mandates that financial organizations take specific actions to protect the security (and privacy) of customer information. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information Security Program that complies with GLBA.


Health Insurance Portability and Accountability Policy Samples
Subpart C Section 164.306 (c) of the Health Insurance Portability and Accountability Act (HIPAA) requires covered entities to comply with specific security standards with respect to all electronic protected health information. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls) that are needed to create, implement, and maintain an Information Security Program that complies with HIPAA.


International Organization for Standardization Security Standard Policy Samples
The International Organization for Standardization Security Standard (ISO 17799) is an internationally recognized information Security Management standard consisting of security clauses, controls, and objectives comprising best practices in information security. This section highlights the templates from the Best Practice Policy Framework library (for example, policy and standards controls)that are needed to create, implement, and maintain an Information Security Program that complies with ISO 17799.


--Mdpeters 08:14, 14 July 2006 (EDT)


Technology Best Practices This section provides sample policy framework templates (for example, policies, standards, and technical standards) that are needed to create, implement, and maintain a best practice, risk management-based information security program.

Database Application Best Practice Configuration Samples
This section provides configuration samples and recommendations for applying secure best practices to database applications.


Operating System Best Practice Configuration Samples
This section provides configuration samples and recommendations for applying secure best practices to various operating systems.


Business Application Best Practice Configuration Samples
This section provides configuration samples and recommendations for applying secure best practices to various business applications.


--Mdpeters 10:54, 16 November 2006 (EST)