You are on page 1of 51

Information Security Policy

EECS 711: Security Management and Audit


Molly Coplen
Dan Hein
Dinesh Raveendran
Learning Objectives
• Define Information security policy and
understand its central role in a successful
information security program
• Recognize the three major types of
information security policy and know what
goes into each type
• Develop, implement, and maintain various
types of information security policies

2 EECS 711 Chapter 4 Information Security Policy


Introduction
• The success of any information security
program lies in policy development
• Policy is the essential foundation of an
effective information security program
• The centrality of information security polices
to virtually everything that happens in the
information security field
• An effective information security training and
awareness effort cannot be initiated without
writing information security policies

3 EECS 711 Chapter 4 Information Security Policy


NIST–Executive guide to the
Protection of Information Resources
• “The success of an information resources protection
program depends on the policy generated, and on
the attitude of management toward securing
information on automated systems. You, the policy
maker, set the tone and the emphasis on how
important a role information security will have within
your agency. Your primary responsibility is to set the
information resource security policy for the
organization within the objectives of reduced risk,
compliance with laws and regulations and assurance
of operational continuity, information integrity, and
confidentiality.”
4 EECS 711 Chapter 4 Information Security Policy
Basic Rules in Shaping a Policy
• Policy should never conflict with law
• Policy must be able to stand up in court, if
challenged
• Policy must be properly supported and
administered
• Example: Enron’s dubious business practices
and misreporting the financial records - Policy
of shredding working papers by accountants

5 EECS 711 Chapter 4 Information Security Policy


Why Policy
• A quality information security program begins and
ends with policy
• Although information security policies are the least
expensive means of control to execute, they are often
the most difficult to implement
• Policy controls cost only the time and effort that the
management team spends to create, approve and
communicate them, and that employees spend
integrating the policies into their daily activities
• Cost of hiring a consultant is minimal compared to
technical controls

6 EECS 711 Chapter 4 Information Security Policy


Guidelines for IT policy
• All policies must contribute to the
success of the organization
• Management must ensure the adequate
sharing of responsibility for proper use
of information systems
• End users of information systems
should be involved in the steps of policy
formulation

7 EECS 711 Chapter 4 Information Security Policy


Bull’s Eye Model
• Proven mechanism for prioritizing
complex changes
• Issues are addressed by moving from
general to specifics
• Focus of systemic solutions instead of
individual problems

8 EECS 711 Chapter 4 Information Security Policy


Bull’s Eye Model (Contd)

9 EECS 711 Chapter 4 Information Security Policy


Bull’s Eye Model Layers
• Policies – the outer layer in the bull’s eye diagram
• Networks – the place where threats from public networks meet
the organization’s networking infrastructure; in the past, most
information security efforts have focused on networks, and until
recently information security was often thought to be
synonymous with network security
• Systems – computers used as servers, desktop computers, and
systems used for process control and manufacturing systems
• Application – all applications systems, ranging from packed
applications such as office automation and e-mail programs, to
high-end ERP packages and custom application software
developed by the organization

10 EECS 711 Chapter 4 Information Security Policy


Charles Cresson Wood’s Need
for Policy
…policies are important reference
documents for internal audits and for
the resolution of legal disputes about
management’s due diligence [and]
policy documents can act as a clear
statement of management’s intent…

11 EECS 711 Chapter 4 Information Security Policy


Policy, Standards, and Practices
• Policy represents the formal statement of the
organization’s managerial policy, in case of our focus,
the organization’s information security philosophy
• Tradition communities of interest use policy to
express their views which then becomes the basis of
planning, management and maintenance of the
information security profile
• Policies – set of rules that dictate acceptable and
unacceptable behavior within an organization
• Policies should not specify the proper operation of
equipment or software

12 EECS 711 Chapter 4 Information Security Policy


Policy, Standards, and Practices (Contd)

• Policies must specify the penalties for unacceptable behavior


and define an appeals process
• To execute the policy, the organization must implement a set of
standards that clarify and define exactly what is inappropriate in
the workplace and to what degree the org will stop to act the
inappropriate behavior
• Standard – More detailed statement of what must be done to
comply with policy
• Technical controls and their associated procedures might be
established such that the network blocks access to
pornographic websites

13 EECS 711 Chapter 4 Information Security Policy


Policy, Standards, and Practices (Contd)

14 EECS 711 Chapter 4 Information Security Policy


Type of InfoSec policies
• Based on NIST Special Publication 800-14, the three
types of information security policies are
– Enterprise information security program policy
– Issue-specific security policies
– System-specific security policies
• The usual procedure
– First – creation of the enterprise information security policy –
the highest level of policy
– Next – general policies are met by developing issue- and
system-specific policies

15 EECS 711 Chapter 4 Information Security Policy


Enterprise Information Security Policy
(EISP)
• EISP sets the strategic direction, scope, and tone for
all of an organization’s security efforts
• EISP assigns responsibilities for the various areas of
information security including maintenance of
information security policies and the practices and
responsibilities of other users.
• EISP guides the development, implementation, and
management requirements of the information security
program
• EISP should directly support the mission and vision
statements
16 EECS 711 Chapter 4 Information Security Policy
Integrating an Organization’s Mission
and Objectives into the EISP
• EISP plays a number of vital roles
• One of the important role is to state the importance of
InfoSec to the organization’s mission and objectives.
• InfoSec strategic planning derives from IT strategic
planning which is itself derived from the
organization’s strategic planning
• Policy will become confusing if EISP does not directly
reflect the above association

17 EECS 711 Chapter 4 Information Security Policy


EISP Elements
• An overview of the corporate philosophy on security
• Information on the structure of the InfoSec
organization and individuals who fulfill the InfoSec
role
• Fully articulated responsibilities for security that are
shared by all members of the organization
• Fully articulated responsibilities for security that are
unique to each role within the organization

18 EECS 711 Chapter 4 Information Security Policy


Components of a good EISP
• Statement of Purpose
• Information Technology Security Elements
• Need for Information Technology Security
• Information Technology Security
Responsibilities and Roles
• Reference to Other Information Technology
Standards and Guidelines

19 EECS 711 Chapter 4 Information Security Policy


Issue-Specific Security Policy
(ISSP)
• Provides a common understanding of
the purposes for which an employee
can and cannot use a technology
– Should not be presented as a foundation
for legal prosecution
• Protects both the employee and
organization from inefficiency and
ambiguity

20 EECS 711 Chapter 4 Information Security Policy


Effective ISSP
• Articulates expectations for use of
technology-based system
• Identifies the processes and authorities
that provide documented control
• Indemnifies the organization against
liability for an employee’s inappropriate
or illegal use of the system

21 EECS 711 Chapter 4 Information Security Policy


ISSP Topics
• Use of Internet, e-mail, phone, and office
equipment
• Incident response
• Disaster/business continuity planning
• Minimum system configuration requirements
• Prohibitions against hacking/testing security
controls
• Home use of company-owned systems
• Use of personal equipment on company
networks

22 EECS 711 Chapter 4 Information Security Policy


ISSP Components
• Statement of Purpose
– Outlines scope and applicability: what is the
purpose and who is responsible for
implementation
• Authorized Uses
– Users have no particular rights of use, outside
that specified in the policy
• Prohibited Uses
– Common prohibitions: criminal use, personal
use, disruptive use, and offensive materials

23 EECS 711 Chapter 4 Information Security Policy


ISSP Components
• Systems Management
– Users relationship to systems management
– Outline users’ and administrators’ responsibilities
• Violations of Policy
– Penalties specified for each kind of violation
– Procedures for (often anonymously) reporting
policy violation
• Policy Review/Modification
• Limitations of Liability

24 EECS 711 Chapter 4 Information Security Policy


ISSP Implementation
• Three common approaches for
creating/managing ISSP
– Create individual independent ISSP documents,
tailored for specific issues
– Create a single ISSP document covering all issues
– Create a modular ISSP document unifying overall
policy creation/management while addressing
specific details with respect to individual issues

25 EECS 711 Chapter 4 Information Security Policy


System Specific Security
Policy (SysSPs)
• SysSPs provide guidance and procedures for
configuring specific systems, technologies,
and applications
– Intrusion detection systems
– Firewall configuration
– Workstation configuration
• SysSPs are most often technical in nature,
but can also be managerial
– Guiding technology application to enforce higher
level policy (e.g. firewall to restrict Internet access)

26 EECS 711 Chapter 4 Information Security Policy


Guidelines for Effective Policy

• Developed using industry-accepted


practices
• Distributed using all appropriate methods
• Reviewed or read by all employees
• Understood by all employees
• Formally agreed to by act or assertion
• Uniformly applied and enforced
27 EECS 711 Chapter 4 Information Security Policy
Developing Information Security
Policy
• Investigation Phase
• Analysis Phase
• Design Phase
• Implementation Phase
• Maintenance Phase

28 EECS 711 Chapter 4 Information Security Policy


Investigation Phase
• Support from senior management
• Support and active involvement of IT
management
• Clear articulation of goals
• Participation by the affected communities
of interest
• Detailed outline of the scope of the policy
development project
29 EECS 711 Chapter 4 Information Security Policy
Analysis Phase
• The analysis phase should produce the
following:
– A new or recent risk assessment or IT audit
documenting the information security
needs of the organization.
– Gathering of key reference materials –
including any existing policies

30 EECS 711 Chapter 4 Information Security Policy


Design Phase
• Users or organization members
acknowledge they have received and
read the policy
– Signature and date on a form
– Banner screen with a warning

31 EECS 711 Chapter 4 Information Security Policy


Implementation Phase

• Policy development team writes policies


• Resources:
– The Web
– Government sites such as NIST
– Professional literature
– Peer networks
– Professional consultants

32 EECS 711 Chapter 4 Information Security Policy


Maintenance Phase
• Policy development team responsible
for monitoring, maintaining, and
modifying the policy

33 EECS 711 Chapter 4 Information Security Policy


Policy Distribution
• Hand policy to employees
• Post policy on a public bulletin board
• E-mail
• Intranet
• Document management system

34 EECS 711 Chapter 4 Information Security Policy


Policy Reading
• Barriers to employees’ reading policies
– Literacy: 14% of American adults scored
“below basic” level in prose literacy
– Language: non-English speaking residents

35 EECS 711 Chapter 4 Information Security Policy


Policy Comprehension
• Language
– At a reasonable reading level
– With minimal technical jargon and
management terminology
• Understanding of issues
– Quizzes

36 EECS 711 Chapter 4 Information Security Policy


Policy Compliance
• Policies must be agreed to by act or
affirmation
• Corporations incorporate policy
confirmation statements into
employment contracts, annual
evaluations

37 EECS 711 Chapter 4 Information Security Policy


Policy Enforcement
• Uniform and impartial enforcement –
must be able to withstand external
scrutiny
• High standards of due care with regard
to policy management – to defend
against claims made by terminated
employees

38 EECS 711 Chapter 4 Information Security Policy


Automated Tools
• VigilEnt Policy Center – a centralized
policy approval and implementation
center
– Manage the approval process
– Reduces need to distribute paper copies
– Manage policy acknowledgement forms

39 EECS 711 Chapter 4 Information Security Policy


VigilEnt Policy Center
Architecture
User Site Company Intranet
Users view policies and quizzes.

User information Administrators


Users read to the company receive policy
policy docs intranet. docs and
Policy docs and
and complete quizzes.
quizzes and news
quizzes.
items to the Intranet.

Administrators publish policy docs and


quizzes. VPC server sends published
policy docs and quizzes to the server
VPC Server Administration Site
for distribution to the user sites.

40 EECS 711 Chapter 4 Information Security Policy


Policy Management
• Policy administrator
• Review schedule
• Review procedures and practices
• Policy and revision dates

41 EECS 711 Chapter 4 Information Security Policy


Policy Administrator
• Policy administrator
– Champion
– Mid-level staff member
– Solicits input from business and
information security communities
– Makes sure policy document and
subsequent revisions are distributed

42 EECS 711 Chapter 4 Information Security Policy


Review Schedule
• Periodically reviewed for currency and
accuracy, and modified to keep current
– Organized schedule of review
– Reviewed at least annually
– Solicit input from representatives of all
affected parties, management, and staff

43 EECS 711 Chapter 4 Information Security Policy


Review Procedures and
Practices
• Easy submission of recommendations
• All comments examined
• Management approved changes
implemented

44 EECS 711 Chapter 4 Information Security Policy


Policy and Revision Date
• Often published without a date
– Legal issue – are employees “complying
with an out-of-date policy
• Should include date of origin, revision
dates
– don’t use “today’s date” in the document
• Sunset clause (expiration date)

45 EECS 711 Chapter 4 Information Security Policy


Information Securities Policy
Made Easy Approach
• Gather key reference materials
• Develop a framework for policies
• Prepare a coverage matrix
• Make critical systems design decisions
• Structure review, approval, and
enforcement processes

46 EECS 711 Chapter 4 Information Security Policy


Information Securities Policy
Made Easy Approach
• Next Steps
– Post policies
– Develop a self-assessment questionnaire
– Develop revised user ID issuance forms
– Develop agreement to comply with InfoSec
policies form
– Develop tests to determine if workers
understand policies

47 EECS 711 Chapter 4 Information Security Policy


Information Securities Policy
Made Easy Approach
• Next steps (continued)
– Assign information security coordinators
– Train information security coordinators
– Prepare and deliver a basic information
security training course
– Develop application-specific information
security policies

48 EECS 711 Chapter 4 Information


Security Policy
Information Securities Policy
Made Easy Approach
• Next steps (continued)
– Develop a conceptual hierarchy of
information security requirements
– Assign information ownership and
custodianship
– Establish an information security
management committee

49 EECS 711 Chapter 4 Information Security Policy


Information Securities Policy
Made Easy Approach
• Next steps (continued)
– Develop an information security
architecture document
– Automate policy enforcement through
policy servers

50 EECS 711 Chapter 4 Information


Security Policy
Final Note

• Policies are a countermeasure to protect


assets from threats
– Policies exist to inform employees of
acceptable (unacceptable) behavior
– Are meant to improve employee productivity
and prevent potentially embarrassing
situations
– Communicate penalties for noncompliance

51 EECS 711 Chapter 4 Information Security Policy

You might also like