SlideShare uma empresa Scribd logo
1 de 12
DOMAIN 3: Information Security Governance and Risk
Management
# 3.05
CISSPills Table of Contents
 Security Policy Framework
 Security Policy Framework Hierarchy
 Security Policy
 Standards
 Guidelines
 Procedures
 Baselines
 Data Classification
CISSPills Security Policy Framework
In order to reduce the likelihood of a security failure, the information security
implementation has to be somewhat formalised by implementing a Security
Policy Framework (SPF).
An SPF involves the creation of a hierarchical set of documents that at each
level increase the level of details and cover specific information and issues.
CISSPills Security Policy Framework Hierarchy
Policies
Standards
Guidelines
Procedures
Strategic
Tactical
CISSPills Security Policy
This is an overall general statement produced by the senior management to define the
main security objectives and to outline the security framework of an organisation. It’s a
strategic plan for implementing security and is used to:
 assign responsibilities;
 define roles;
 specify audit requirements;
 outline enforcement processes;
 indicate compliance requirements;
 define acceptable risk.
The Security Policy is often used as a proof that management is exercising due care
and is compulsory.
Policies are written in broad terms, however more granularity is needed to support
them and this is where standards, guidelines and procedures come into play.
CISSPills Security Policy (cont’d)
 Organisational security policy: this focuses on issues relevant to every aspects of an
organisation. This is also referred to as master security policy;
 Issue-specific policy: this focuses on individual topics that the management feels need
more detailed explanations and attention to make sure a comprehensive structure is built
(e.g. e-mails);
 System-specific policy: this focuses on individual systems, or types of systems, and
outlines how these should be protected (e.g. databases).
In addition to these focused types of policies, there are three overall categories of security
policies: regulatory, advisory and informative.
 Regulatory policy: this type of policy ensures that the organisation is following standards
set by specific industry regulations (e.g. HIPAA, PCI-DSS, etc.); it’s very detailed and specific
to a type of industry (e.g. Financial Services);
 Advisory policy: this type of policy discusses behaviours and activities that are acceptable
and defines consequence of violations;
 Informative policy: this type of policy is designed to provide information or knowledge about
a specific subject; it’s not enforceable, but rather teaches individuals about specific issues.
CISSPills Standards
Standards are mandatory activities, actions or rules that help supporting and
reinforce policies.
They are tactical documents, which ensure that specific technologies,
applications and parameters are applied in a consistent fashion
(standardised) across the organisation.
It is more granular than a policy and specify how protection should be
implemented and followed.
CISSPills Guidelines
Guidelines are the next tier in the SPF hierarchy and offer recommendation
on how standards are implemented and serve as operational guides for both
security professionals and users.
Whereas standards are specific mandatory rules, guidelines are not
compulsory.
CISSPills Procedures
Procedures are the final element of the hierarchy; they provide detailed step-
by-step documents that describe the exact actions necessary to implement a
specific security mechanism, control or solution.
The purpose of a procedure is to ensure the integrity of a business process: if
everything is accomplished by following the detailed steps, then all the
activities should be in compliance with policies, standards and guidelines.
Procedures ensure standardisation of security across all systems.
CISSPills Baselines
The term baseline can have two meanings:
 It can refer to a point in time configuration/status that is used as a
comparison for future changes;
 It can also refer to define the minimum level of protection required.
CISSPills Data Classification
Data Classification is the process of organising items, information, objects
and so forth based on their need for secrecy, sensitivity or confidentiality.
The reason for this categorisation is because securing any asset in the same
way is not cost-effective; hence data classification is the practice by which it
is possible ensuring that assets are protected proportionally to their level of
criticality.
Once data are categorised according to their sensitivity level, it is possible
deciding what security controls are necessary to protect the different
classification levels.
Data classification allows to follow a risk-based approach when it comes to
asset protection, which means that the number and strength of controls
deployed for an asset depends on its importance.
CISSPills That’s all Folks!
We are done, thank you for the interest! Hope you have enjoyed these pills as much
as I have had fun writing them.
For comments, typos, complaints or whatever your want, drop me an e-mail at:
cisspills <at> outlook <dot> com
More resources:
 Stay tuned on for the next issues;
 Join ”CISSP Study Group Italia” if you are preparing your exam.
Brought to you by Pierluigi Falcone. More info about me on
Contact Details

Mais conteúdo relacionado

Mais procurados

Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policieswardjo
 
Risk Presentation
Risk Presentation Risk Presentation
Risk Presentation lneut03
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
Security Policies
Security PoliciesSecurity Policies
Security Policiesphanleson
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy Allen Baranov
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Manuel Guillen
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planningWilliam Godwin
 
Centralized Cybersecurity in a Decentralized World
Centralized Cybersecurity in a Decentralized WorldCentralized Cybersecurity in a Decentralized World
Centralized Cybersecurity in a Decentralized WorldBob Turner
 
Implementing security
Implementing securityImplementing security
Implementing securityDhani Ahmad
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSecurestorm
 

Mais procurados (20)

Isms info
Isms infoIsms info
Isms info
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 
Domain 1 - Security and Risk Management
Domain 1 - Security and Risk ManagementDomain 1 - Security and Risk Management
Domain 1 - Security and Risk Management
 
Risk Presentation
Risk Presentation Risk Presentation
Risk Presentation
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Security Policies
Security PoliciesSecurity Policies
Security Policies
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Security policies
Security policiesSecurity policies
Security policies
 
So you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to SuccessSo you want to be a CISO - 5 steps to Success
So you want to be a CISO - 5 steps to Success
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Mhdscs2019 v049n03 010
Mhdscs2019 v049n03 010Mhdscs2019 v049n03 010
Mhdscs2019 v049n03 010
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
CISO-Fundamentals
CISO-FundamentalsCISO-Fundamentals
CISO-Fundamentals
 
Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020Kmicro Cybersecurity Offerings 2020
Kmicro Cybersecurity Offerings 2020
 
Business case for enterprise continuity planning
Business case for enterprise continuity planningBusiness case for enterprise continuity planning
Business case for enterprise continuity planning
 
Centralized Cybersecurity in a Decentralized World
Centralized Cybersecurity in a Decentralized WorldCentralized Cybersecurity in a Decentralized World
Centralized Cybersecurity in a Decentralized World
 
Implementing security
Implementing securityImplementing security
Implementing security
 
SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0SABSA Implementation(Part II)_ver1-0
SABSA Implementation(Part II)_ver1-0
 
Simplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game planSimplifying Security for Cloud Adoption - Defining your game plan
Simplifying Security for Cloud Adoption - Defining your game plan
 

Semelhante a CISSPills #3.05

1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docxdurantheseldine
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirementsgurneyhal
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTebonyman0007
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdfsdfghj21
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfAbuHanifah59
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Dam Frank
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfkimangeloullero
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Bonagiri Rajitha
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 
Information security policy how to writing
Information security policy how to writingInformation security policy how to writing
Information security policy how to writingPasangdolmoTamang
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity ModelCSCJournals
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, aMaximaSheffield592
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxKinetic Potential
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapEstelaJeffery653
 

Semelhante a CISSPills #3.05 (20)

1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
Business information security requirements
Business information security requirementsBusiness information security requirements
Business information security requirements
 
CISSPills #3.06
CISSPills #3.06CISSPills #3.06
CISSPills #3.06
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Chapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdfChapter 7 Managing Secure System.pdf
Chapter 7 Managing Secure System.pdf
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
Chapter003
Chapter003Chapter003
Chapter003
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Information security policy how to writing
Information security policy how to writingInformation security policy how to writing
Information security policy how to writing
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Cyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptxCyber Families - Incident Response.pptx
Cyber Families - Incident Response.pptx
 
CHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chapCHAPTER 3 Security Policies and Regulations In this chap
CHAPTER 3 Security Policies and Regulations In this chap
 

Mais de Pierluigi Falcone, CISSP, CISM, CCSK, SABSA Foundation (6)

CISSPills #1.03
CISSPills #1.03CISSPills #1.03
CISSPills #1.03
 
CISSPills #1.02
CISSPills #1.02CISSPills #1.02
CISSPills #1.02
 
CISSPills #1.01
CISSPills #1.01CISSPills #1.01
CISSPills #1.01
 
Annex 01
Annex 01Annex 01
Annex 01
 
CISSPills #3.04
CISSPills #3.04CISSPills #3.04
CISSPills #3.04
 
CISSPills #3.03
CISSPills #3.03CISSPills #3.03
CISSPills #3.03
 

Último

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Último (20)

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

CISSPills #3.05

  • 1. DOMAIN 3: Information Security Governance and Risk Management # 3.05
  • 2. CISSPills Table of Contents  Security Policy Framework  Security Policy Framework Hierarchy  Security Policy  Standards  Guidelines  Procedures  Baselines  Data Classification
  • 3. CISSPills Security Policy Framework In order to reduce the likelihood of a security failure, the information security implementation has to be somewhat formalised by implementing a Security Policy Framework (SPF). An SPF involves the creation of a hierarchical set of documents that at each level increase the level of details and cover specific information and issues.
  • 4. CISSPills Security Policy Framework Hierarchy Policies Standards Guidelines Procedures Strategic Tactical
  • 5. CISSPills Security Policy This is an overall general statement produced by the senior management to define the main security objectives and to outline the security framework of an organisation. It’s a strategic plan for implementing security and is used to:  assign responsibilities;  define roles;  specify audit requirements;  outline enforcement processes;  indicate compliance requirements;  define acceptable risk. The Security Policy is often used as a proof that management is exercising due care and is compulsory. Policies are written in broad terms, however more granularity is needed to support them and this is where standards, guidelines and procedures come into play.
  • 6. CISSPills Security Policy (cont’d)  Organisational security policy: this focuses on issues relevant to every aspects of an organisation. This is also referred to as master security policy;  Issue-specific policy: this focuses on individual topics that the management feels need more detailed explanations and attention to make sure a comprehensive structure is built (e.g. e-mails);  System-specific policy: this focuses on individual systems, or types of systems, and outlines how these should be protected (e.g. databases). In addition to these focused types of policies, there are three overall categories of security policies: regulatory, advisory and informative.  Regulatory policy: this type of policy ensures that the organisation is following standards set by specific industry regulations (e.g. HIPAA, PCI-DSS, etc.); it’s very detailed and specific to a type of industry (e.g. Financial Services);  Advisory policy: this type of policy discusses behaviours and activities that are acceptable and defines consequence of violations;  Informative policy: this type of policy is designed to provide information or knowledge about a specific subject; it’s not enforceable, but rather teaches individuals about specific issues.
  • 7. CISSPills Standards Standards are mandatory activities, actions or rules that help supporting and reinforce policies. They are tactical documents, which ensure that specific technologies, applications and parameters are applied in a consistent fashion (standardised) across the organisation. It is more granular than a policy and specify how protection should be implemented and followed.
  • 8. CISSPills Guidelines Guidelines are the next tier in the SPF hierarchy and offer recommendation on how standards are implemented and serve as operational guides for both security professionals and users. Whereas standards are specific mandatory rules, guidelines are not compulsory.
  • 9. CISSPills Procedures Procedures are the final element of the hierarchy; they provide detailed step- by-step documents that describe the exact actions necessary to implement a specific security mechanism, control or solution. The purpose of a procedure is to ensure the integrity of a business process: if everything is accomplished by following the detailed steps, then all the activities should be in compliance with policies, standards and guidelines. Procedures ensure standardisation of security across all systems.
  • 10. CISSPills Baselines The term baseline can have two meanings:  It can refer to a point in time configuration/status that is used as a comparison for future changes;  It can also refer to define the minimum level of protection required.
  • 11. CISSPills Data Classification Data Classification is the process of organising items, information, objects and so forth based on their need for secrecy, sensitivity or confidentiality. The reason for this categorisation is because securing any asset in the same way is not cost-effective; hence data classification is the practice by which it is possible ensuring that assets are protected proportionally to their level of criticality. Once data are categorised according to their sensitivity level, it is possible deciding what security controls are necessary to protect the different classification levels. Data classification allows to follow a risk-based approach when it comes to asset protection, which means that the number and strength of controls deployed for an asset depends on its importance.
  • 12. CISSPills That’s all Folks! We are done, thank you for the interest! Hope you have enjoyed these pills as much as I have had fun writing them. For comments, typos, complaints or whatever your want, drop me an e-mail at: cisspills <at> outlook <dot> com More resources:  Stay tuned on for the next issues;  Join ”CISSP Study Group Italia” if you are preparing your exam. Brought to you by Pierluigi Falcone. More info about me on Contact Details