Page 18 - DCAP516_COMPUTER_SECURITY
P. 18

Computer Security




                    Notes          large company, developing a single policy document that speaks to all types of users within the
                                   organization and addresses all the information security issues necessary may prove impossible.
                                   A more effective concept is to develop a suite of policy documents to cover all information
                                   security bases; these can be targeted for specific audiences, making a more efficient process for
                                   everyone.
                                   This unit examines the elements that need to be considered when developing and maintaining
                                   information security policy and goes on to present a design for a suite of information security
                                   policy documents and the accompanying development process.
                                   It should be noted that there is no single method for developing a security policy or policies.
                                   Many factors must be taken into account, including audience type and company business and
                                   size, etc. One other factor is the maturity of the policy development process currently in place.
                                   A company which currently has no information security policy or only a very basic one may
                                   initially use a different strategy to a company which already has a substantial policy framework
                                   in place, but wants to tighten it up and start to use policy for more complex purposes such as to
                                   track compliance with legislation. When starting out it is a good idea to use a phased approach,
                                   starting with a basic policy framework, hitting the major policies that are needed and then
                                   subsequently developing a larger number of policies, revising those that are already in place
                                   and adding to this through the development of accompanying guidelines and job aids documents
                                   which will help support policy. The varying levels of maturity in policy development are
                                   discussed later in this paper in more detail.

                                   2.1 Why Do You Need Security Policy?

                                   Basic Purpose of Policy


                                   A security policy should fulfill many purposes. It should:
                                   1.  Protect people and information
                                   2.  Set the rules for expected behavior by users, system administrators, management, and
                                       security personnel
                                   3.  Authorize security personnel to monitor, probe, and investigate
                                   4.  Define and authorize the consequences of violation
                                   5.  Define the company consensus baseline stance on security
                                   6.  Help minimize risk

                                   7.  Help track compliance with regulations and legislation
                                   Information security policies provide a framework for best practice that can be followed by all
                                   employees. They help to ensure risk is minimized and that any security incidents are effectively
                                   responded to. Information security policies will also help turn staff into participants in the
                                   company’s efforts to secure its information assets, and the process of developing these policies
                                   will help to define a company’s information assets. Information security policy defines the
                                   organization’s attitude to information, and announces internally and externally that information
                                   is an asset, the property of the organization, and is to be protected from unauthorized access,
                                   modification, disclosure, and destruction.
                                   Policy and Legislative Compliance

                                   In addition to the purposes described above, security policies can be useful in ways that go
                                   beyond the immediate protection of assets and policing of behavior. They can be useful compliance



          12                                LOVELY PROFESSIONAL UNIVERSITY
   13   14   15   16   17   18   19   20   21   22   23