Information Security Strategy
Equally important are these three elements of a comprehensive corporate security strategy:
-
Infrastructure components to do as much threat mitigation as practical with a reasonable ROI.
-
A comprehensive set of written policies that outline very specific roles, responsibilities, and methods.
-
An ongoing Security Awareness Training program so every employee becomes a front line security watchdog.
Documentation should be developed at two levels. At the highest level are a small number of non-technical policies that outline the goals of the organization and enforcement of these goals. The policies should carry explicit endorsement by the highest level of management. The second level is a set of written standards that specifically outline, in sufficient technical detail, various infrastructure requirements and the roles and responsibilities to maintain compliance with these standards.
The documents themselves should be owned by specific functions within the organization and carry an explicit review process to ensure they are kept current.
Policy topics:
-
Overall policy that defines organizational security directives endorsed by senior company executive(s).
-
Overall acceptable use policy that defines the behavior of every employee in the use of Information Technology assets.
-
Set of Standards (below) that defines in detail how the technical details of the Information Technology infrastructure will be managed.
-
Specific technology (i.e. firewalls, intrusion detection/prevention systems, virus protection software, etc.) to aid in stopping common threats.
Standards topics:
-
Security Awareness Training process
-
Risk Management, Roles and Responsibilities
-
Access provisioning process details, Access Review process details
-
System Administration procedures
-
Malware Protection
-
Authentication
-
Remote Access
-
Firewall Management
-
Logging and Monitoring procedures
-
Wireless (WiFi) Management
-
Information Technology Review and Audit procedures
-
Information Technology Asset Management procedures
-
Encryption Process, Key Management for encryption
-
Server Room Protection
-
Media Protection, Media Disposal
-
Information Classification, Information Handling
-
Business Resilience Program
-
Backup and Restore procedures
-
System Development security procedures
-
Change Management procedures
-
Data Integrity Management