5.3 Policies for Organizational Security
Personnel Security
Acceptable use policy (AUP) = this covers how all different technologies in an environment should be used, internet use, telephone use, computers/mobile device use
Business policies: - job rotation = keep people moving between responsibilities, no one person maintains control for long periods of time - mandatory vacations = rotate others through the job, the longer the vacation the better chance to identify fraud - separation of duties = concept of having more than one person required to complete a task - split knowledge: no one person has all the details, each person holds separate data items - dual control: two people must be present to perform the business function
Least privilege = setting user privilege to the bare minimum, only allowing required tasks nothing more than that
Third-Party Risk Management
Supply chain = the whole system involved when creating a product
Business partners = much closer to your data than a vendor and still very risky if they got compromised
Common agreements - SLA (service level agreement) - MOU (memorandum of understanding) - MSA (measurement system analysis)
End of life (EOL) = manufacturer stops selling a product - may continue support the product - important for security patches and updates
End of service life (EOSL) = manufacturer stops selling a product - support is no longer available for the product - no security patches or updates
Managing Data
Data governance = rules, processes and accountability associated with an organization's data - data steward = manages the governance process, responsible for data accuracy, privacy, and security
Data retention = practice of storing data for a specific period of time - keep files that change frequently for version control
Credential Policies
Personnel accounts = account on a computer associated with a specific person - no privileged access to the operating system
Add additional layers of security to all accounts such as MFA (multi-factor authentication) and audit the security posture, also don't allow account sharing among other users
Organizational Policies
Change management / change control - determine the scope of the change, analyze the risk associated with the change
Asset management - track license - verify devices that are up to date - respond faster to security problems
Last updated
Was this helpful?