Table of Contents

Chapter 1: Understanding Policy

Looking at Policy Through the Ages

The Bible as Ancient Policy

The United States Constitution as a Policy Revolution

Policy Today

Information Security Policy

Successful Policy Characteristics

The Role of Government

Information Security Policy Lifecycle

Policy Development

Policy Publication

Policy Adoption

Policy Review

References

Regulations and Directives Cited

Other References

Chapter 2: Policy Elements and Style

Policy Hierarchy

Standards

Baselines

Guidelines

Procedures

Plans and Programs

Policy Format

Policy Audience

Policy Format Types

Policy Components

Writing Style and Technique

Using Plain Language

The Plain Language Movement

Plain Language Techniques for Policy Writing

References

Regulations and Directives Cited

Other References

Chapter 3: Information Security Framework

CIA

What Is Confidentiality?

What Is Integrity?

What Is Availability?

Who Is Responsible for CIA?

Information Security Framework

What Is NIST’s Function?

What Does the ISO Do?

Can the ISO Standards and NIST Publications Be Used to Build a Framework?

References

Regulations Cited

ISO Research

NIST Research

Other References

Chapter 4: Governance and Risk Management

Understanding Information Security Policies

What Is Meant by Strategic Alignment?

Regulatory Requirements

User Versions of Information Security Policies

Vendor Versions of Information Security Policies

Client Synopsis of Information Security Policies

Who Authorizes Information Security Policy?

Revising Information Security Policies: Change Drivers

Evaluating Information Security Polices

Information Security Governance

What Is a Distributed Governance Model?

Regulatory Requirements

Information Security Risk

Is Risk Bad?

Risk Appetite and Tolerance

What Is a Risk Assessment?

Risk Assessment Methodologies

What Is Risk Management?

References

Regulations Cited

Other References

Chapter 5: Asset Management

Information Assets and Systems

Who Is Responsible for Information Assets?

Information Classification

How Does the Federal Government Classify Data?

Why Is National Security Information Classified Differently?

Who Decides How National Security Data Is Classified?

How Does the Private Sector Classify Data?

Can Information Be Reclassified or Even Declassified?

Labeling and Handling Standards

Why Label?

Why Handling Standards?

Information Systems Inventory

What Should Be Inventoried?

References

Regulations Cited

Executive Orders Cited

Other Research

Chapter 6: Human Resources Security

The Employee Lifecycle

What Does Recruitment Have to Do with Security?

What Happens in the Onboarding Phase?

What Is User Provisioning?

What Should an Employee Learn During Orientation?

Why Is Termination Considered the Most Dangerous Phase?

The Importance of Employee Agreements

What Are Confidentiality or Non-disclosure Agreements?

What Is an Acceptable Use Agreement?

The Importance of Security Education and Training

What Is the SETA Model?

References

Regulations Cited

Other Research

Chapter 7: Physical and Environmental Security

Understanding the Secure Facility Layered Defense Model

How Do We Secure the Site?

How Is Physical Access Controlled?

Protecting Equipment

No Power, No Processing?

How Dangerous Is Fire?

What About Disposal?

Stop, Thief!

References

Regulations Cited

Other References

Chapter 8: Communications and Operations Security

Standard Operating Procedures (SOPs)

Why Document SOPs?

Developing SOPs

Operational Change Control

Why Manage Change?

Why Is Patching Handled Differently?

Malware Protection

Are There Different Types of Malware?

How Is Malware Controlled?

What Is Antivirus Software?

Data Replication

Is There a Recommended Backup or Replication Strategy?

Secure Messaging

What Makes Email a Security Risk?

Are Email Servers at Risk?

Activity Monitoring and Log Analysis

What Is Log Management?

Service Provider Oversight

What Is Due Diligence?

What Should Be Included in Service Provider Contracts?

References

Regulations Cited

Other References

Chapter 9: Access Control Management

Access Control Fundamentals

What Is a Security Posture?

How Is Identity Verified?

What Is Authorization?

Infrastructure Access Controls

Why Segment a Network?

What Is Layered Border Security?

Remote Access Security

User Access Controls

Why Manage User Access?

What Types of Access Should Be Monitored?

References

Regulations Cited

Other References

Chapter 10: Information Systems Acquisition, Development, and Maintenance

System Security Requirements

Secure Code

Cryptography

References

Regulations Cited

Other References

Chapter 11: Information Security Incident Management

Organizational Incident Response

What Is an Incident?

How Are Incidents Reported?

What Is an Incident Response Program?

What Happened? Investigation and Evidence Handling

Data Breach Notification Requirements

Is There a Federal Breach Notification Law?

Does Notification Work?

References

Regulations Cited

Other References

Chapter 12: Business Continuity Management

Emergency Preparedness

What Is a Resilient Organization?

Business Continuity Risk Management

What Is a Business Continuity Threat Assessment?

What Is a Business Continuity Risk Assessment?

What Is a Business Impact Assessment?

The Business Continuity Plan

Roles and Responsibilities

Disaster Response Plans

Operational Contingency Plans

The Disaster Recovery Phase

The Resumption Phase

Plan Testing and Maintenance

Why Is Testing Important?

Plan Maintenance

References

Regulations Cited

Executive Orders Cited

Other References

Chapter 13: Regulatory Compliance for Financial Institutions

The Gramm-Leach-Bliley Act (GLBA)

What Is a Financial Institution?

What Are the Interagency Guidelines?

What Is a Regulatory Examination?

Personal and Corporate Identity Theft

What Is Required by the Interagency Guidelines Supplement A?

What Is Required by the Supplement to the Authentication in an Internet Banking Environment Guidance?

References

Regulations Cited

Other References

Chapter 14: Regulatory Compliance for the Healthcare Sector

The HIPAA Security Rule

What Is the Objective of the HIPAA Security Rule?

Enforcement and Compliance

How Is the HIPAA Security Rule Organized?

What Are the Physical Safeguards?

What Are the Technical Safeguards?

What Are the Organizational Requirements?

What Are the Policies and Procedures Standards?

The HITECH Act and the Omnibus Rule

What Changed for Business Associates?

What Are the Breach Notification Requirements?

References

Regulations Cited

Other References

Chapter 15: PCI Compliance for Merchants

Protecting Cardholder Data

What Is the PCI DDS Framework?

Business-as-Usual Approach

What Are the PCI Requirements?

PCI Compliance

Who Is Required to Comply with PCI DSS?

What Is a Data Security Compliance Assessment?

What Is the SAQ?

Are There Penalties for Noncompliance?

References

Appendix A: Information Security Program Resources

National Institute of Standards and Technology (NIST) Special Publications

Federal Financial Institutions Examination Council (FFIEC) IT Handbooks

Department of Health and Human Services HIPAA Security Series

Payment Security Standards Council Documents Library

Information Security Professional Development and Certification Organizations

Appendix B: Sample Information Security Policy

Introduction

Policy Exemptions

Policy Violation

Version Control

Section 1: Governance and Risk Management

Overview

Goals and Objectives for Section 1: Governance and Risk Management

Governance and Risk Management Policy Index

1.0 Governance and Risk Management Policy

Supporting Resources and Source Material

Lead Author

Section 2: Asset Management

Overview

Goals and Objectives for Section 2: Asset Management

Asset Management Policy Index

2.0 Asset Management Policy

Supporting Resources and Source Material

Lead Author

Section 3: Human Resources Security

Overview

Goals and Objectives for Section 3: Human Resources Security

Human Resources Security Policy Index

3.0 Human Resources Security Policy

Supporting Resources and Source Material

Lead Author

Section 4: Physical and Environmental Security

Overview

Goals and Objectives for Section 4: Physical and Environmental Security

Physical and Environmental Security Policy Index

4.0 Physical and Environmental Security Policy

Supporting Resources and Source Material

Lead Author

Section 5: Communications and Operations Security

Overview

Goals and Objectives for Section 5: Communications and Operations Security

Communications and Operations Policy Index

5.0 Communications and Operations Policy

Supporting Resources and Source Material

Lead Author

Section 6: Access Control Management

Overview

Goals and Objectives for Section 6: Access Control Management

Infrastructure Access Control Policy Index

6.0 Access Control Policy

Supporting Resources and Source Material

Lead Author

Section 7: Information Systems Acquisition, Development, and Maintenance

Overview

Goals and Objectives for Section 7: Information Systems Acquisition, Development, and Maintenance

Information Systems Acquisition, Development, and Maintenance Policy Index

7.0 Information Systems Acquisition, Development, and Maintenance Policy

Supporting Resources and Source Material

Lead Author

Section 8: Incident Management

Overview

Goals and Objectives for Section 8: Incident Management

Incident Management Policy Index

8.0 Incident Management Policy

Supporting Resources and Source Material

Lead Author

Section 9: Business Continuity

Overview

Goals and Objectives for Section 9: Business Continuity

Business Continuity Policy Index

9.0 Business Continuity Policy

Supporting Resources and Source Material

Lead Author

Appendix C: Information Systems Acceptable Use Agreement and Policy

Information Systems Acceptable Use Agreement

Distribution

Information Systems Acceptable Use Agreement

Acceptable Use of Information Systems Policy

1.0 Data Protection

2.0 Authentication and Password Controls

3.0 Application Security

4.0 Messaging Use and Security

5.0 Internet Use and Security

6.0 Mobile Devices Security

7.0 Remote Access Security

8.0 Incident Detection and Reporting

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.221.123.73