Podcast
Questions and Answers
What is the primary goal of Information Security Governance (ISG)?
What is the primary goal of Information Security Governance (ISG)?
- To implement specific security technologies across the organization.
- To ensure all employees are properly trained in security protocols.
- To manage the daily operations of the IT department.
- To provide strategic direction and establish objectives for measuring progress. (correct)
Which of the following is validated by Information Security Governance?
Which of the following is validated by Information Security Governance?
- The frequency of security awareness training sessions.
- The selection of specific software vendors.
- The appropriateness of Risk Management (RM) practices and proper asset usage. (correct)
- Employee compliance with industry certifications.
Which of the following is NOT typically considered an ISG outcome?
Which of the following is NOT typically considered an ISG outcome?
- Performance Measurement
- Technical Support (correct)
- Resource Management
- Strategic Alignment
What is the relationship between policies and the law?
What is the relationship between policies and the law?
Which of the following best describes the function of a security policy?
Which of the following best describes the function of a security policy?
Which of the following provides detailed minimum specifications for compliance with a policy?
Which of the following provides detailed minimum specifications for compliance with a policy?
Which of the following is the most accurate description of a security guideline?
Which of the following is the most accurate description of a security guideline?
What is the purpose of a security procedure?
What is the purpose of a security procedure?
An effective and legally enforceable policy requires which of the following?
An effective and legally enforceable policy requires which of the following?
What is the purpose of the 'Comprehension' criterion in creating an effective policy?
What is the purpose of the 'Comprehension' criterion in creating an effective policy?
What is the primary focus of an Enterprise Information Security Policy (EISP)?
What is the primary focus of an Enterprise Information Security Policy (EISP)?
Which document typically drafts the Enterprise Information Security Policy (EISP)?
Which document typically drafts the Enterprise Information Security Policy (EISP)?
What is the purpose of addressing compliance in an Enterprise Information Security Policy (EISP)?
What is the purpose of addressing compliance in an Enterprise Information Security Policy (EISP)?
What is the main purpose of an Issue-Specific Security Policy (ISSP)?
What is the main purpose of an Issue-Specific Security Policy (ISSP)?
Why do Issue-Specific Security Policies (ISSPs) require frequent updates?
Why do Issue-Specific Security Policies (ISSPs) require frequent updates?
What is a System-Specific Security Policy (SysSP)?
What is a System-Specific Security Policy (SysSP)?
What determines whether a System-Specific Security Policy (SysSP) requires organizational-wide approval?
What determines whether a System-Specific Security Policy (SysSP) requires organizational-wide approval?
Why must policies be managed so that they are constantly updated?
Why must policies be managed so that they are constantly updated?
To remain viable, which of the following elements should policies have?
To remain viable, which of the following elements should policies have?
What is the purpose of including a policy issuance and revision date on a security policy?
What is the purpose of including a policy issuance and revision date on a security policy?
Flashcards
Information Security Governance
Information Security Governance
Responsibilities and practices by the board and executive management to provide strategic direction and measure progress.
Policy
Policy
Organizational law dictating acceptable and unacceptable behavior, sanctioned by management.
Standard
Standard
Detailed statements specifying what must be done to comply with policy; prescribes minimum specifications for compliance.
Guideline
Guideline
Signup and view all the flashcards
Procedure
Procedure
Signup and view all the flashcards
Enterprise Information Security Policy (EISP)
Enterprise Information Security Policy (EISP)
Signup and view all the flashcards
Information Systems Security Policy (ISSP)
Information Systems Security Policy (ISSP)
Signup and view all the flashcards
System-Specific Security Policy (SysSP)
System-Specific Security Policy (SysSP)
Signup and view all the flashcards
Policy Reviews
Policy Reviews
Signup and view all the flashcards
Study Notes
- IS planning includes information security governance, policies, standards, guidelines, and procedures
Information Security Governance
- Governance involves responsibilities and practices by the board and executive management
- The goal of governance is to provide strategic direction, set objectives, and measure progress
- Governance validates the appropriateness of risk management practices and proper asset use
- ISG outcomes include strategic alignment (SA), risk management (RM), resource management (PM), value delivery (VD) and performance measurement
Policies, Standards, Guidelines and Procedures
- Policies should be based on management from communities of interest for IS planning, design, and deployment
- Policies direct how to address issues and use technologies
- Policies should never contradict the law, must be able to stand up in court and must be properly administered
- Security policies are the least expensive but most difficult controls to implement
Policy
- Functions as organizational law defining acceptable and unacceptable behavior
- Policies are sanctioned by management
- An example of such a policy is employees using strong passwords, changing them regularly, and protecting them against disclosure
Standard
- Comprises more detailed statements for policy compliance
- Includes detailed minimum specifications for compliance
- An example of a standard is passwords being at least 18 characters long and changed every 90 days
Guideline
- Effectively explains how to comply with policy
- Gives recommendations for compliance
- For example, using diceware to help generate a passprase
Procedure
- Provides step-by-step instructions for compliance
- For example, "click on... then click on... then click on save" within Windows
Criteria for Effective Policy
- Development (industry-accepted)
- Dissemination (distribution)
- Review (reading)
- Compliance (agreement)
- Comprehension (understanding)
- Uniform enforcement (fairness in application)
Types of Policies
Enterprise Information Security Policy (EISP)
- A high-level security policy that sets the overall security direction for the entire organization
- Sets strategic direction, scope, and tone for all security efforts
- Executive-level document drafted by or with the CIO
- Addresses general compliance for meeting requirements, establishing programs, and assigning responsibilities
- Addresses use of specific penalties and disciplinary actions
- Elements should include an overview of corporate security philosophy, information on the structure of the organization, articulated responsibilities for all members of the organization and unique elements for each role in the organization
Information System Security Policy (ISSP)
- Addresses specific security issues within the organization
- Addresses specific areas of technology
- Requires frequent updates and contains a statement on the organization's position on specific issues
- Common Approaches include; creating several independent ISSPs, creating a single comprehensive ISSP or a modular ISSP.
System Specific Security Policy (SysSP)
- These are technical policies designed for specific systems or devices
- Can operate as the standards or procedures used when configuring or maintaining systems
- Are divided into two groups: managerial guidance (separation of duties, etc.) and technical specifications
- Functions as a minimum configuration setting in a system
- Typically does not require organizational-wide approval
Policy Management
- Policies must be managed and updated, to remain viable
- A responsible manager, a schedule of reviews, a method for making recommendations for review and automated policy management are needed
- Policies must have a policy issuance and revision date
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.