Information Security Planning

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the primary goal of Information Security Governance (ISG)?

  • To implement specific security technologies across the organization.
  • To ensure all employees are properly trained in security protocols.
  • To manage the daily operations of the IT department.
  • To provide strategic direction and establish objectives for measuring progress. (correct)

Which of the following is validated by Information Security Governance?

  • The frequency of security awareness training sessions.
  • The selection of specific software vendors.
  • The appropriateness of Risk Management (RM) practices and proper asset usage. (correct)
  • Employee compliance with industry certifications.

Which of the following is NOT typically considered an ISG outcome?

  • Performance Measurement
  • Technical Support (correct)
  • Resource Management
  • Strategic Alignment

What is the relationship between policies and the law?

<p>Policies must never contradict the law and must be able to stand up in court. (D)</p> Signup and view all the answers

Which of the following best describes the function of a security policy?

<p>An organizational law that dictates acceptable and unacceptable behavior. (B)</p> Signup and view all the answers

Which of the following provides detailed minimum specifications for compliance with a policy?

<p>Standard (A)</p> Signup and view all the answers

Which of the following is the most accurate description of a security guideline?

<p>A recommendation or suggestion on how to comply with a policy. (C)</p> Signup and view all the answers

What is the purpose of a security procedure?

<p>To provide step-by-step instructions for compliance. (D)</p> Signup and view all the answers

An effective and legally enforceable policy requires which of the following?

<p>Uniform enforcement and industry-accepted development practices. (A)</p> Signup and view all the answers

What is the purpose of the 'Comprehension' criterion in creating an effective policy?

<p>To ensure the policy is easily understood by all members of the organization. (A)</p> Signup and view all the answers

What is the primary focus of an Enterprise Information Security Policy (EISP)?

<p>Setting the overall security direction for the organization. (B)</p> Signup and view all the answers

Which document typically drafts the Enterprise Information Security Policy (EISP)?

<p>The Chief Information Officer (CIO) (D)</p> Signup and view all the answers

What is the purpose of addressing compliance in an Enterprise Information Security Policy (EISP)?

<p>To ensure meeting of requirements to establish a program and assigning responsibilities. (A)</p> Signup and view all the answers

What is the main purpose of an Issue-Specific Security Policy (ISSP)?

<p>To address specific security issues within the organization. (A)</p> Signup and view all the answers

Why do Issue-Specific Security Policies (ISSPs) require frequent updates?

<p>To reflect rapid changes in technology. (C)</p> Signup and view all the answers

What is a System-Specific Security Policy (SysSP)?

<p>A technical policy designed for specific systems or devices. (C)</p> Signup and view all the answers

What determines whether a System-Specific Security Policy (SysSP) requires organizational-wide approval?

<p>Whether it alters minimum configuration settings in a system. (A)</p> Signup and view all the answers

Why must policies be managed so that they are constantly updated?

<p>Because organizational needs and risks continuously evolve. (A)</p> Signup and view all the answers

To remain viable, which of the following elements should policies have?

<p>A responsible manager, a schedule of reviews, and automated policy management. (A)</p> Signup and view all the answers

What is the purpose of including a policy issuance and revision date on a security policy?

<p>To identify which version of the policy is current. (A)</p> Signup and view all the answers

Flashcards

Information Security Governance

Responsibilities and practices by the board and executive management to provide strategic direction and measure progress.

Policy

Organizational law dictating acceptable and unacceptable behavior, sanctioned by management.

Standard

Detailed statements specifying what must be done to comply with policy; prescribes minimum specifications for compliance.

Guideline

Explanations of how to comply with policy with recommendations for compliance.

Signup and view all the flashcards

Procedure

Step-by-step instructions for compliance.

Signup and view all the flashcards

Enterprise Information Security Policy (EISP)

High-level security policy setting the overall security direction for the entire organization.

Signup and view all the flashcards

Information Systems Security Policy (ISSP)

Addresses specific security issues within the organization.

Signup and view all the flashcards

System-Specific Security Policy (SysSP)

Technical policies designed for specific systems or devices.

Signup and view all the flashcards

Policy Reviews

An essential component for policy viability.

Signup and view all the flashcards

Study Notes

  • IS planning includes information security governance, policies, standards, guidelines, and procedures

Information Security Governance

  • Governance involves responsibilities and practices by the board and executive management
  • The goal of governance is to provide strategic direction, set objectives, and measure progress
  • Governance validates the appropriateness of risk management practices and proper asset use
  • ISG outcomes include strategic alignment (SA), risk management (RM), resource management (PM), value delivery (VD) and performance measurement

Policies, Standards, Guidelines and Procedures

  • Policies should be based on management from communities of interest for IS planning, design, and deployment
  • Policies direct how to address issues and use technologies
  • Policies should never contradict the law, must be able to stand up in court and must be properly administered
  • Security policies are the least expensive but most difficult controls to implement

Policy

  • Functions as organizational law defining acceptable and unacceptable behavior
  • Policies are sanctioned by management
  • An example of such a policy is employees using strong passwords, changing them regularly, and protecting them against disclosure

Standard

  • Comprises more detailed statements for policy compliance
  • Includes detailed minimum specifications for compliance
  • An example of a standard is passwords being at least 18 characters long and changed every 90 days

Guideline

  • Effectively explains how to comply with policy
  • Gives recommendations for compliance
  • For example, using diceware to help generate a passprase

Procedure

  • Provides step-by-step instructions for compliance
  • For example, "click on... then click on... then click on save" within Windows

Criteria for Effective Policy

  • Development (industry-accepted)
  • Dissemination (distribution)
  • Review (reading)
  • Compliance (agreement)
  • Comprehension (understanding)
  • Uniform enforcement (fairness in application)

Types of Policies

Enterprise Information Security Policy (EISP)

  • A high-level security policy that sets the overall security direction for the entire organization
  • Sets strategic direction, scope, and tone for all security efforts
  • Executive-level document drafted by or with the CIO
  • Addresses general compliance for meeting requirements, establishing programs, and assigning responsibilities
  • Addresses use of specific penalties and disciplinary actions
  • Elements should include an overview of corporate security philosophy, information on the structure of the organization, articulated responsibilities for all members of the organization and unique elements for each role in the organization

Information System Security Policy (ISSP)

  • Addresses specific security issues within the organization
  • Addresses specific areas of technology
  • Requires frequent updates and contains a statement on the organization's position on specific issues
  • Common Approaches include; creating several independent ISSPs, creating a single comprehensive ISSP or a modular ISSP.

System Specific Security Policy (SysSP)

  • These are technical policies designed for specific systems or devices
  • Can operate as the standards or procedures used when configuring or maintaining systems
  • Are divided into two groups: managerial guidance (separation of duties, etc.) and technical specifications
  • Functions as a minimum configuration setting in a system
  • Typically does not require organizational-wide approval

Policy Management

  • Policies must be managed and updated, to remain viable
  • A responsible manager, a schedule of reviews, a method for making recommendations for review and automated policy management are needed
  • Policies must have a policy issuance and revision date

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Use Quizgecko on...
Browser
Browser