compliances , information-rights-management , security

Document Sets and Strategies that you should consider for your Organization

March 17, 2010

All security domains integrated strategy

All security domains strategy documentReview of all security domains integrated security documentManagement commitment to information securityManagement commitment to securitySupporting security philosophy & valuesSecurity a business enablerSecurity integrated across all business functionsAll security domains security program design

Domains security program design

All security domains program charter document

Security program concept of operationsSecurity roles & responsibilities definitionSecurity program vision & missionEncompasses all domains of securityInformation security policyAllocation of information security responsibilitiesInformation security coordination

Contact with authoritiesRoles and responsibilitiesManagement responsibilitiesRoles and procedures

Security organization structure

Chief Security Officer (hires the correct people and considers their advise)

Review of all security domains program charter documentOrganization policies

Responsibility for assetsAcceptable use of assetsOwnership of assetsInformation exchange policies and proceduresSecurity policyResponsibility for assetsOwnership of assetsAcceptable use of assetsInformation exchange policyInformation security policy documentOther organization policiesEmployee code of conductInformation security policyResponsibility for assetsAccess control policyReview of the information security policyReview of security policy document

Enterprise architecture

Enterprise reference architecture documentReview of enterprise reference architecture document

Enterprise Integrated risk management

Enterprise Integrated risk management planEnterprise Integrated risk management documentReview of enterprise Integrated risk management document

All security domains strategic plan

Management commitment to information securityManagement commitment to securitySupporting security philosophy & valuesSecurity a business enablerAll security domains strategic plan documentAlignment with business strategyReview of all security domains strategic plan documentSecurity integrated across all business functions

All security domains security program design

All security domains program charter document

Chief Security OfficerChief Information OfficerSecurity program concept of operations

Security organization structureSecurity roles & responsibilities definitionSecurity program vision & mission

Encompasses all domains of security

Organization policiesReview of all security domains program charter documentSecurity policyResponsibility for assetsOwnership of assetsAcceptable use of assetsInformation exchange policyInformation security policy document

Enterprise architecture

Enterprise reference architecture

Enterprise reference architecture documentReview of enterprise reference architecture documentOther organization policiesEmployee code of conductInformation security policyResponsibility for assetsRoles and responsibilitiesManagement responsibilitiesEnterprise Integrated risk management

Enterprise Integrated risk management plan

Enterprise Integrated risk management documentReview of SIM / SEM awarenessAll security domains strategic plan

All security domains strategic plan document

Alignment with business strategyReview of all security domains strategic plan document

Information Security Mgmt & Ops

Information security program designInformation security program charter documentInformation security program vision & missionInformation security program concept of operationsInformation security organization structureReview of Information security program charter document

Information security strategic plan

Alignment with all security domains strategic planInformation security strategic plan documentReview information security strategic plan document

ISMS Management and Operations

Internal organizationIntellectual property rightsOperational planning for information securityAlignment with information security strategic planMaintain and review operational plans for information securityRelations with external entitiesExternal partiesInformation security staff training & developmentInformation security staff competenciesInformation security career development pathsContact with special interest groupsInformation security staff certification trainingInformation security staff recruitmentMaintain and review information security staffing plansAddressing security when dealing with customersAddressing information security when dealing with customersIdentification of risks related to external partiesIdentification of risks related to external partiesInformation security in agreements with other organizationsAddressing security in third party agreementsReporting legal or criminal violationsData exchange agreementsExchange agreements

Information technology security risk management

Management of information security incidents and improvementsCollection of evidenceReporting information security eventsContact with law enforcement agenciesInformation security incident management

Reporting information security incidents

Reporting information security events and weaknessesReporting information security weaknessesReporting security weaknessesInvestigating information security incidents

Learning from information security incidents

Collection of forensic evidence for legal actionSecurity policy enforcementInformation security threat and risk assessmentIdentified additional safeguards to reduce unacceptable riskMonitor that additional safeguards are appliedPrepare threat and risk assessment reportReview and update TRA report to reflect changes in system or risk environmentConfidentiality agreements with other organizationsConfidentiality agreements

Enterprise information security posture

Linkages to enterprise integrated risk management planRoles and proceduresIncident management proceduresTechnical Vulnerability ManagementTechnical vulnerability and path managementInformation system security compliance inspections

Regulatory Compliance

Management of compliance obligationsIdentification of applicable legislationIntellectual property rightsProtection of organizational recordsRegulation of cryptographic controlsProtection of organizational recordsData protection and privacy of personal informationPrevention of misuse of information processing facilities

Compliance reporting

Data protection and
privacy of personal informationPrevention of misuse of information processing systemsRegulation of cryptographic controlsCompliance with legal requirementsIntellectual property rights

ISMS Review

ISMS internal auditISMS metrics and measurementISMS internal program evaluationInspections for organization compliance with information security policies and standardsCompliance with security policies and standards

Audits of information systems

Information systems audit controlsProtection of information systems audit toolsIndependent review of information securityISMS external third-party reviewISMS external third-party audit

Third party Service delivery management

Managing changes to third party services

Third party services deliveryService delivery

Monitoring and review of third party services deliveryMonitoring and review of third party servicesManaging changes to third party services deliveryThird party managed security servicesISMS Quality assuranceISMS continuous improvementInformation security standards and guidelinesInformation Security standards and guideline documentsReview of information security standards and guideline documents

Information Classification

Information labeling and handlingInformation classification guidelinesClassification guidelines

Information labeling and handlingInformation Lifecycle Management

Destruction and disposal of informationStorage of informationInformation monitoringTraceabilitySecurity logs

Information storage guidelines

Information disposal and destruction guidelinesArchiving organization informationExchange of Information

ISMS Quality assurance

ISMS continuous improvementInformation security standards and guidelinesInformation Security standards and guideline documentsReview of information security standards and guideline documentsInformation ClassificationInformation labeling and handlingInformation classification guidelinesClassification guidelinesInformation labeling and handlingInformation Lifecycle ManagementDestruction and disposal of information

Storage of information

Information monitoringTraceabilitySecurity logsInformation storage guidelinesInformation disposal and destruction guidelinesArchiving organization informationExchange of Information

Control of information exchanged internally and externally

Control of informationIdentification of assetsProtection of trade secrets, patents and copy write informationMedia handling

Security of system documentation

Management of removable mediaManagement of removable mediaDisposal of mediaDisposal of media

Information handling procedures

Security of information system documentation

Management of personal information

Identification of privacy risks to personal informationPrivacy Impact Assessment

Security inspections of third party service providers

Compliance with information security in third party service agreements

Physical & Environmental Security

Physical Security of IT-related infrastructure

Secure AreasSecuring offices, rooms and facilities

Physical security perimeterPhysical entry controlsSecuring offices, rooms and facilities

Protecting against external & environmental threatsWorking in secure areasPublic access, delivery and loading areasPublic access, delivery and loading areasPhysical security risk managementPhysical security threat and risk assessmentIdentified additional safeguards to reduce unacceptable riskMonitor that additional safeguards are appliedPrepare threat and risk assessment reportReview and update TRA report to reflect changes in physical risk environment

Physical security of IT equipment and environment

Equipment sittingRemoval of property

IT equipment sitting and physical protectionEquipment sitting and protectionPhysical protection of supporting utilities (HVAC?)Physical security of environmental controlsSupporting utilitiesPhysical security of cablingCabling securityEquipment maintenanceEquipment maintenancePhysical security of equipment off premisesSecurity of equipment off premisesSecure disposal or re-use of equipmentSecure disposal or re-use of equipment

Physical security of IT media, equipment and devices

Physical media in transitIT media in transitIT media at restStorage of IT media in approved secure containersPhysical security of USBs & portable storage devices

Physical security of laptops, smart phones, and PDAs

User physical security protection measures of IT equipment, devices and servicesClear desk and workstation areaIn the officeUnattended user equipmentUnattended user IT-related assetsClear desk and clear screen policyMobile computing & teleworkingWorking from HomeMinimal labelingUse different travel caseNo baggage check for IT devicesPrevent shoulder-surfingDon’t share or loan organization-issued IT equipment, devices or servicesUse only organization-issued and approved IT equipment and software.Protect private keys, tokens and passwords for remote access.No sharing of organization-issued IT equipment, devices or services.Use only organization-approved secure VPN connections to access organization systems & servicesLog off when not in use or away from the workstation.

Physical security for sensitive information systems

Guidelines for physical security fit-up of secure information systems

Assurance of physical security for IT-related Infrastructure

Physical security certification and accreditation of IT-related InfrastructureAuthorization process for information processing facilitiesPhysical security authorization process for IT-related infrastructure

Physical prevention measures against emanations from IT-related infrastructure & equipment

Emanations shielding for workstations

Personnel SecurityPrior to employment

Terms and conditions of employmentConfidentiality agreementsPersonnel security in hiring processesSecurity obligations included in employment lettersScreening of potential hires and contractorsScreeningNon-disclosure agreement

During employment

Supervisory enforcement of information security policies and standards

Segregation of dutiesLeast privilegeNeed to knowSecurity clearanceReview of employee access to information, buildings, information systems and networksDisciplinary processDisciplinary process for information security violationsInformation security training and awarenessInformation security awarenes
s, education and trainingSegregation of dutiesInternal affairs investigations

Termination or change of employment

Removal of access rights

Termination responsibilitiesReturn of assetsReturn of assetsRemoval of access rights

Information technology security standards and guidelines

Information security standards and guidelines documentation

Review of IT security standards and guidelines documentationInformation exchange policies and proceduresPolicy on the use of network services

Procurement of IT security products

Information System Security

Access control

Review of user access rightsUser access managementUser registrationPrivilege managementUser password managementReview of user access rightsPassword management systemUse of system utilitiesSession time-outLimitation of connection timeSession time-outApplication and information access controlSensitive system isolationInformation access restrictionSensitive system isolationApplication and information access controlOperating system access controlSecure log-on proceduresUser identification and authenticationBiometric authenticationBusiness requirement for access control

Information system back upBack-upInformation back-up

MonitoringAudit logging

Monitoring system useProtection of log informationAdministrator and operator logsFault logging

Trusted time source

Clock synchronization for all network and OS’s

www.bestitdocuments.com