Document Sets and Strategies that you should consider for your Organization
March 17, 2010All security domains integrated strategy
All security domains strategy documentReview of all security domains integrated security documentManagement commitment to information securityManagement commitment to securitySupporting security philosophy & valuesSecurity a business enablerSecurity integrated across all business functionsAll security domains security program design
Domains security program design
All security domains program charter document
Security program concept of operationsSecurity roles & responsibilities definitionSecurity program vision & missionEncompasses all domains of securityInformation security policyAllocation of information security responsibilitiesInformation security coordination
Contact with authoritiesRoles and responsibilitiesManagement responsibilitiesRoles and procedures
Security organization structure
Chief Security Officer (hires the correct people and considers their advise)
Review of all security domains program charter documentOrganization policies
Responsibility for assetsAcceptable use of assetsOwnership of assetsInformation exchange policies and proceduresSecurity policyResponsibility for assetsOwnership of assetsAcceptable use of assetsInformation exchange policyInformation security policy documentOther organization policiesEmployee code of conductInformation security policyResponsibility for assetsAccess control policyReview of the information security policyReview of security policy document
Enterprise architecture
Enterprise reference architecture documentReview of enterprise reference architecture document
Enterprise Integrated risk management
Enterprise Integrated risk management planEnterprise Integrated risk management documentReview of enterprise Integrated risk management document
All security domains strategic plan
Management commitment to information securityManagement commitment to securitySupporting security philosophy & valuesSecurity a business enablerAll security domains strategic plan documentAlignment with business strategyReview of all security domains strategic plan documentSecurity integrated across all business functions
All security domains security program design
All security domains program charter document
Chief Security OfficerChief Information OfficerSecurity program concept of operations
Security organization structureSecurity roles & responsibilities definitionSecurity program vision & mission
Encompasses all domains of security
Organization policiesReview of all security domains program charter documentSecurity policyResponsibility for assetsOwnership of assetsAcceptable use of assetsInformation exchange policyInformation security policy document
Enterprise architecture
Enterprise reference architecture
Enterprise reference architecture documentReview of enterprise reference architecture documentOther organization policiesEmployee code of conductInformation security policyResponsibility for assetsRoles and responsibilitiesManagement responsibilitiesEnterprise Integrated risk management
Enterprise Integrated risk management plan
Enterprise Integrated risk management documentReview of SIM / SEM awarenessAll security domains strategic plan
All security domains strategic plan document
Alignment with business strategyReview of all security domains strategic plan document
Information Security Mgmt & Ops
Information security program designInformation security program charter documentInformation security program vision & missionInformation security program concept of operationsInformation security organization structureReview of Information security program charter document
Information security strategic plan
Alignment with all security domains strategic planInformation security strategic plan documentReview information security strategic plan document
ISMS Management and Operations
Internal organizationIntellectual property rightsOperational planning for information securityAlignment with information security strategic planMaintain and review operational plans for information securityRelations with external entitiesExternal partiesInformation security staff training & developmentInformation security staff competenciesInformation security career development pathsContact with special interest groupsInformation security staff certification trainingInformation security staff recruitmentMaintain and review information security staffing plansAddressing security when dealing with customersAddressing information security when dealing with customersIdentification of risks related to external partiesIdentification of risks related to external partiesInformation security in agreements with other organizationsAddressing security in third party agreementsReporting legal or criminal violationsData exchange agreementsExchange agreements
Information technology security risk management
Management of information security incidents and improvementsCollection of evidenceReporting information security eventsContact with law enforcement agenciesInformation security incident management
Reporting information security incidents
Reporting information security events and weaknessesReporting information security weaknessesReporting security weaknessesInvestigating information security incidents
Learning from information security incidents
Collection of forensic evidence for legal actionSecurity policy enforcementInformation security threat and risk assessmentIdentified additional safeguards to reduce unacceptable riskMonitor that additional safeguards are appliedPrepare threat and risk assessment reportReview and update TRA report to reflect changes in system or risk environmentConfidentiality agreements with other organizationsConfidentiality agreements
Enterprise information security posture
Linkages to enterprise integrated risk management planRoles and proceduresIncident management proceduresTechnical Vulnerability ManagementTechnical vulnerability and path managementInformation system security compliance inspections
Regulatory Compliance
Management of compliance obligationsIdentification of applicable legislationIntellectual property rightsProtection of organizational recordsRegulation of cryptographic controlsProtection of organizational recordsData protection and privacy of personal informationPrevention of misuse of information processing facilities
Compliance reporting
Data protection and
privacy of personal informationPrevention of misuse of information processing systemsRegulation of cryptographic controlsCompliance with legal requirementsIntellectual property rights
ISMS Review
ISMS internal auditISMS metrics and measurementISMS internal program evaluationInspections for organization compliance with information security policies and standardsCompliance with security policies and standards
Audits of information systems
Information systems audit controlsProtection of information systems audit toolsIndependent review of information securityISMS external third-party reviewISMS external third-party audit
Third party Service delivery management
Managing changes to third party services
Third party services deliveryService delivery
Monitoring and review of third party services deliveryMonitoring and review of third party servicesManaging changes to third party services deliveryThird party managed security servicesISMS Quality assuranceISMS continuous improvementInformation security standards and guidelinesInformation Security standards and guideline documentsReview of information security standards and guideline documents
Information Classification
Information labeling and handlingInformation classification guidelinesClassification guidelines
Information labeling and handlingInformation Lifecycle Management
Destruction and disposal of informationStorage of informationInformation monitoringTraceabilitySecurity logs
Information storage guidelines
Information disposal and destruction guidelinesArchiving organization informationExchange of Information
ISMS Quality assurance
ISMS continuous improvementInformation security standards and guidelinesInformation Security standards and guideline documentsReview of information security standards and guideline documentsInformation ClassificationInformation labeling and handlingInformation classification guidelinesClassification guidelinesInformation labeling and handlingInformation Lifecycle ManagementDestruction and disposal of information
Storage of information
Information monitoringTraceabilitySecurity logsInformation storage guidelinesInformation disposal and destruction guidelinesArchiving organization informationExchange of Information
Control of information exchanged internally and externally
Control of informationIdentification of assetsProtection of trade secrets, patents and copy write informationMedia handling
Security of system documentation
Management of removable mediaManagement of removable mediaDisposal of mediaDisposal of media
Information handling procedures
Security of information system documentation
Management of personal information
Identification of privacy risks to personal informationPrivacy Impact Assessment
Security inspections of third party service providers
Compliance with information security in third party service agreements
Physical & Environmental Security
Physical Security of IT-related infrastructure
Secure AreasSecuring offices, rooms and facilities
Physical security perimeterPhysical entry controlsSecuring offices, rooms and facilities
Protecting against external & environmental threatsWorking in secure areasPublic access, delivery and loading areasPublic access, delivery and loading areasPhysical security risk managementPhysical security threat and risk assessmentIdentified additional safeguards to reduce unacceptable riskMonitor that additional safeguards are appliedPrepare threat and risk assessment reportReview and update TRA report to reflect changes in physical risk environment
Physical security of IT equipment and environment
Equipment sittingRemoval of property
IT equipment sitting and physical protectionEquipment sitting and protectionPhysical protection of supporting utilities (HVAC?)Physical security of environmental controlsSupporting utilitiesPhysical security of cablingCabling securityEquipment maintenanceEquipment maintenancePhysical security of equipment off premisesSecurity of equipment off premisesSecure disposal or re-use of equipmentSecure disposal or re-use of equipment
Physical security of IT media, equipment and devices
Physical media in transitIT media in transitIT media at restStorage of IT media in approved secure containersPhysical security of USBs & portable storage devices
Physical security of laptops, smart phones, and PDAs
User physical security protection measures of IT equipment, devices and servicesClear desk and workstation areaIn the officeUnattended user equipmentUnattended user IT-related assetsClear desk and clear screen policyMobile computing & teleworkingWorking from HomeMinimal labelingUse different travel caseNo baggage check for IT devicesPrevent shoulder-surfingDon’t share or loan organization-issued IT equipment, devices or servicesUse only organization-issued and approved IT equipment and software.Protect private keys, tokens and passwords for remote access.No sharing of organization-issued IT equipment, devices or services.Use only organization-approved secure VPN connections to access organization systems & servicesLog off when not in use or away from the workstation.
Physical security for sensitive information systems
Guidelines for physical security fit-up of secure information systems
Assurance of physical security for IT-related Infrastructure
Physical security certification and accreditation of IT-related InfrastructureAuthorization process for information processing facilitiesPhysical security authorization process for IT-related infrastructure
Physical prevention measures against emanations from IT-related infrastructure & equipment
Emanations shielding for workstations
Personnel SecurityPrior to employment
Terms and conditions of employmentConfidentiality agreementsPersonnel security in hiring processesSecurity obligations included in employment lettersScreening of potential hires and contractorsScreeningNon-disclosure agreement
During employment
Supervisory enforcement of information security policies and standards
Segregation of dutiesLeast privilegeNeed to knowSecurity clearanceReview of employee access to information, buildings, information systems and networksDisciplinary processDisciplinary process for information security violationsInformation security training and awarenessInformation security awarenes
s, education and trainingSegregation of dutiesInternal affairs investigationsTermination or change of employment
Removal of access rights
Termination responsibilitiesReturn of assetsReturn of assetsRemoval of access rights
Information technology security standards and guidelines
Information security standards and guidelines documentation
Review of IT security standards and guidelines documentationInformation exchange policies and proceduresPolicy on the use of network services
Procurement of IT security products
Information System Security
Access control
Review of user access rightsUser access managementUser registrationPrivilege managementUser password managementReview of user access rightsPassword management systemUse of system utilitiesSession time-outLimitation of connection timeSession time-outApplication and information access controlSensitive system isolationInformation access restrictionSensitive system isolationApplication and information access controlOperating system access controlSecure log-on proceduresUser identification and authenticationBiometric authenticationBusiness requirement for access control
Information system back upBack-upInformation back-up
MonitoringAudit logging
Monitoring system useProtection of log informationAdministrator and operator logsFault logging
Trusted time source
Clock synchronization for all network and OS’s
www.bestitdocuments.com