Personnel Security Policies and Practices

CISSP candidates must have a basic understanding of various employment policies and practices, as well as how these policies achieve information security objectives. You should also know the various information security roles and responsibilities within an organization.

cross-reference.eps We also discuss various components of personnel security in Chapter 9.

Background checks and security clearances

Pre- and post-employment background checks can provide an employer with valuable information about an individual whom an organization is considering for a job or position within an organization. Such checks can give an immediate indication of an individual’s integrity and can help screen out unqualified applicants.

Basic background checks should be conducted for all personnel with access to sensitive information or systems within an organization. A basic background check should include

check.png Reference checks: Personal, professional, and employment

check.png Verification of data in employment applications and resumes: Social Security numbers, education, professional/technical certifications, military records, and previous employment

check.png Other records: Court, local law enforcement, and motor vehicle records

Personnel who fill sensitive positions should undergo a more extensive pre-employment screening and background check, possibly including

check.png Credit records

check.png Drug testing

check.png Special background investigation: FBI and INTERPOL records, field interviews with former associates, or a personal interview with a private investigator

Periodic post-employment screenings (such as credit records and drug testing) may also be necessary, particularly for personnel with access to financial data, cash, or high-value assets, or for personnel being considered for promotions to more sensitive or responsible positions.

Employment agreements

Various employment agreements should be signed when an individual joins an organization or is promoted to a more sensitive position within an organization. Typical employment agreements include non-compete/non-disclosure agreements and acceptable use policies.

Hiring and termination practices

Hiring and termination practices should be formalized within an organization to ensure fair and uniform treatment and to protect the organization and its information assets.

Standard hiring practices should include background checks and employment agreements (as we discuss in the preceding sections), as well as a formal indoctrination and orientation process. This process may include formal introductions to key organizational personnel, creating user accounts and assigning IT resources (PCs and notebook computers, for example), assigning security badges and parking permits, and a general policy discussion with Human Resources personnel.

Formal termination procedures should be implemented to help protect the organization from potential lawsuits, property theft and destruction, unauthorized access, or workplace violence. Procedures should be developed for various scenarios including resignations, termination, layoffs, accident or death, immediate departures versus prior notification, and hostile situations. Termination procedures may include

check.png Having the former employee surrender keys, security badges, and parking permits

check.png Conducting an exit interview

check.png Making security escort the former employee to collect his or her personal belongings and/or to leave the premises

check.png Asking the former employee to return company materials (notebook computers, mobile phones and devices, PDAs, and so on)

check.png Changing door locks and system passwords

check.png Formally turning over duties and responsibilities

check.png Removing network and system access and disabling user accounts

check.png Enforcing policies regarding retention of e-mail, personal files, and employment records

check.png Notifying customers, partners, vendors, and contractors, as appropriate

Job descriptions

Concise job descriptions that clearly identify an individual’s responsibility and authority, particularly on information security issues, can help

check.png Reduce confusion and ambiguity.

check.png Provide legal basis for an individual’s authority or actions.

check.png Demonstrate any negligence or dereliction in carrying out assigned duties.

Security roles and responsibilities

The truism that information security is “everyone’s responsibility” is too often put into practice as Everyone is responsible, but no one is accountable. To avoid this pitfall, specific roles and responsibilities for information security should be defined in an organization’s security policy, individual job or position descriptions, and third-party contracts. These roles and responsibilities should apply to employees, consultants, contractors, interns, and vendors. And they should apply to every level of staff, from C-level executives to line employees. Several broad categories for information security roles and common responsibilities are discussed in the following sections.

Management

Senior-level management is often responsible for information security at several levels, including the role as an information owner, which we discuss in the following section. However, in this context, management has a responsibility to demonstrate a strong commitment to an organization’s information security program through the following actions:

check.png Creating a corporate information security policy: This policy should include a statement of support from management and should also be signed by the CEO, COO, or CIO.

check.png Leading by example: A CEO who refuses to carry a mandatory identification badge or who bypasses system access controls sets a poor example.

check.png Rewarding compliance: Management should expect proper security behavior and acknowledge, recognize, and/or reward employees accordingly.

remember.eps Management is always ultimately responsible for an organization’s overall information security and for any information security decisions that are made (or not made). Our role as information security professionals is to report security issues and to make appropriate information security recommendations to management.

Owner

An information owner is normally assigned at an executive or senior- management level within an organization, such as director or vice-president. An information owner doesn’t legally own the information assigned to him or her; the information owner is ultimately responsible for safeguarding assigned information assets and may have fiduciary responsibility or be held personally liable for negligence in protecting these assets under the concept of due care.

cross-reference.eps For more on due care, read Chapter 12.

Typical responsibilities of an information owner may include

check.png Determining information classification levels for assigned information assets

check.png Determining policy for access to the information

check.png Maintaining inventories and accounting for assigned information assets

check.png Periodically reviewing classification levels of assigned information assets for possible downgrading, destruction, or disposal

check.png Delegating day-to-day responsibility (but not accountability) and functions to a custodian

Custodian

An information custodian is the individual who has day-to-day responsibility for protecting information assets. IT systems administrators or network administrators often fill this role. Typical responsibilities may include

check.png Performing regular backups and restoring data, when necessary

check.png Ensuring that directory and file permissions are properly implemented and provide sufficient protection

check.png Assigning new users to appropriate permission groups and revoking user privileges, when required

check.png Maintaining classified documents or other materials in a vault or secure file room

remember.eps The distinction between owners and custodians, particularly regarding their different responsibilities, is an important concept in information security management. The information owner has ultimate responsibility for the security of the information, whereas the information custodian is responsible for the day-to-day security administration.

Users

An end-user (or user) includes just about everyone within an organization. Users aren’t specifically designated. They can be broadly defined as anyone who has authorized access to an organization’s internal information or information systems. Typical user responsibilities include

check.png Complying with all security requirements defined in organizational policies, standards, and procedures; applicable legislative or regulatory requirements; and contractual requirements (such as non-disclosure agreements and Service Level Agreements).

check.png Exercising due care in safeguarding organizational information and information assets.

check.png Participating in information security training and awareness efforts.

check.png Reporting any suspicious activity, security violations, security problems, or security concerns to appropriate personnel.

Separation of duties and responsibilities

The concept of separation (or segregation) of duties and responsibilities ensures that no single individual has complete authority and control over a critical system or process. This practice promotes security in the following ways:

check.png Reduces opportunity for waste, fraud, or abuse.

check.png Provides two-man control (also called dual-control or two-person integrity).

cross-reference.eps check.png Reduces dependence on individuals (see the section “Avoiding single points of failure,” earlier in this chapter).

Smaller organizations may find this practice difficult to implement because of limited personnel and resources.

Job rotation

Job rotation (or rotation of duties) provides another effective security control with many benefits to an organization. Similar to the concept of separation of duties and responsibilities (discussed in the preceding section), job rotations involve regularly transferring key personnel into different positions or departments within an organization. Job rotations benefit an organization in the following ways:

check.png Reduce opportunity for waste, fraud, or abuse.

check.png Reduce dependence, through cross-training opportunities, on individuals, as well as promote professional growth.

check.png Reduce monotony and/or fatigue for individuals.

As with the practice of separation of duties, job rotations can be difficult to implement in smaller organizations.

tip.eps A side benefit of job rotations is that people are far less likely to commit fraudulent activities, for fear that they will be caught if they are unexpectedly rotated into another position.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.226.109