Case Studies and Examples of IT Security Policy Implementations

Unlike previous chapters, rather than provide individual case studies, this section will give general guidelines on implementing security policies from respected resources. This will provide you with the broadest possible understanding of security policy implementation.

CIO Magazine

In 2019, CIO Magazine published an article on how to implement a successful security policy.1 This article begins by advising that one assess the current state of security. That is usually good advice in any security situation. The article also recommends implementing monitoring. This is the best way to have an ongoing understanding of what is happening on the network.

Only after those preliminary steps does one set security measures and controls. The article provides good general guidelines on how to do this. This includes the use of live documents that are easy to update and thus always current. The article also recommends end-to-end security. Most notably, CIO Magazine recommends working to foster a dynamic security culture.

SANS

The SANS Institute has a white paper on building and implementing a security policy.2 This document actually provides examples of how to structure specific security policies. One of the examples is given in FIGURE 13-3.

A chart provides an overview of a policy stance.

FIGURE 13-3 Like CIO Magazine, SANS recommends monitoring as a key mechanism for understanding what is occurring on the network. Just as importantly, the white paper provides a list of resources to assist you.

Courtesy of SANS Institute, used with permission.

Public Sector Case Study

This is an older case, but it is still important because of the significant impact it has. In November 2012, South Carolina state officials disclosed a massive data breach at the Department of Revenue. Few details on the breach were disclosed, but it involved exposing more than 3.6 million taxpayers’ personal information records and 650,000 business tax–related records. The breach occurred in September 2012. It’s clear that massive amounts of personal information were stolen.

A former top official with the FBI estimated the cost to the state at more than $350 million, based upon past FBI experience, including the cost of offering free credit monitoring to affected individual taxpayers and businesses.

The root cause of the breach cited in news reports was the lack of mandatory security policies across 100 state agencies, boards, commissions, and colleges and universities.

All state agencies have some type of computer security system in place. It’s fair to assume they all have some level of security policy in place. But it is clear these policies were discretionary. That meant an approach to information security across state government that was at best inconsistent. Nor did the state appear to have a comprehensive approach to sharing best practices for information security or for coordinating response to these types of data breaches.

In the case of the South Carolina Department of Revenue, the policies clearly were neither adequate nor consistent. Additionally, reports indicate the source of the hack was in Eastern Europe. The hacker or hackers gained access through a phishing email. Phishing emails try to trick a user to open an email and execute a link or program with malware. Security awareness is a strong control that educates users on how to protect themselves from such attacks, including how to recognize such attacks and why not to open suspect links. If a phishing email was a source of the attack, it might be an indication that the security awareness program at this state agency was inadequate.

 

2 https://www.sans.org/reading-room/whitepapers/policyissues/paper/509

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.22.71.28