Policies-Standards and Planning
Policies-Standards and Planning
Objectives
• Define management’s role in the development,
maintenance, and enforcement of information
security policy, standards, practices, procedures,
and guidelines
• Describe an information security blueprint, identify
its major components, and explain how it is used to
support the network security program
• discuss how an organization institutionalizes its
policies, standards, and practices using education,
training, and awareness programs
• Explain what contingency planning is and how incident
response planning, disaster recovery planning, and
business continuity plans are related to contingency
planning
Introduction
– Configuration rules
Systems-Specific Policy (SysSP)
(continued)
• Both Microsoft Windows and Novell Netware
5.x/6.x families translate ACLs into
configurations used to control access
• ACLs allow configuration to restrict access from
anyone
and anywhere
• Rule policies are more specific to operation of a
system than ACLs
• Many security systems require specific
configuration scripts telling systems what actions
to perform on each set of information they
process
Policy Management
• NIST SP 800-26
– Management controls cover security processes
designed by the strategic planners and performed by
security administration
• Defense in depth
– Implementation of security in layers
– Requires that organization establish sufficient security
controls and safeguards so that an intruder faces
multiple layers of controls
• Security perimeter
– Point at which an organization’s security protection
ends and outside world begins
– Does not apply to internal attacks from employee
threats or on-site physical threats
Key Technology Components
• Firewall: device that selectively discriminates
against information flowing into or out of
organization
– Documentation of incident
Incident Containment Strategies