Security Policies and their Types - CISSP Certification


An organization's executive management or policy board must set security policies that define the place and value of security inside the organization. These rules must identify the organization's security goal and commercial objectives. The terms utilized are not complicated by technical jargon and are easy to read. It is also essential that the rules be easy to understand. In addition, these regulations need to be forward-thinking and assessed and amended if significant changes occur within the company.

Only a few of the eight domains need to focus on for CISSP exam questions. The focus must be on Risk and Security Management, Security Engineering, Asset Security, Network Security, Communication, Managing Identity, Access, Testing, Security Operations and Assessment, and Software Development Security.

The CISSP test covers numerous security policies

You will evaluate informational security policies and your understanding of regulatory and advisory with the help of this test. Having a solid experience in these three categories of policies is essential.

Regulatory − When a company or organization has a regulatory policy, they may ensure that they will carefully comply with the standards imposed by the applicable industry regulations. Regulatory laws are often helpful to public utilities, financial institutions, and other organizations that are in the business of serving the general public's best interests. For instance, within the last ten years, Texas has implemented new regulations mandating that firms retain extensive records of employee patents and ideas. You must keep these documents for at least five years after the patent or concept has been filed.

Advisory − This policy is effective because it offers employees clear direction on the sanctioned behavior and those that do not get approval according to the firm's standards. Even though the tenets of the policies may not be legally binding, severe ramifications may nevertheless apply in case of a breach. In some businesses, reprimands can extend up to termination of employment as a sanction.

Informative − This security policy is not intended to impose any mandate, either explicitly or inferentially; instead, its sole purpose is to inform. In virtually all companies, policies that aim to educate staff members can be found. For example, a human resources representative (HR) and an employee ombudsperson might collaborate to investigate employee complaints, make sure they are heard, and find solutions.

The company took the position. The company's new security endeavor will use the concept put out here as its foundation. It makes the broad strategy that will be utilized to roll out the company's security measures, including those for its IT infrastructure, official so it may implement it.

Guidelines for a Particular System

This form of policy concentrates its attention on a particular computer system. The most fundamental function is to display the hardware and software authorized for use on that specific machine.

Specific Regulations for Each Subject Area Lastly, this policy zeroes in on a particular aspect of functioning that deserves a closer investigation and focuses on that. In light of the policy's requirements, organizations typically adopt a supplementary approach that meets the appropriate level of security. Among the many examples of such rules are policies regarding email, updates to systems, encryption, user access, and security problems.

The Certified Information Systems Security Professional Exam, known as the CISSP exam, tests candidates' knowledge of security standards.

One of the eight CISSP domains that are examined is called Security and Risk Management, and it is responsible for governing security standards. Standards are more specific than policies, and as a result, they are seen as tactical papers since they detail the specific activities or procedures that must carry out to satisfy a need

Policy and procedure information

Another aspect of the umbrella concept of security and risk management is the establishment of guidelines and procedures. What does it imply when we speak about differences and similarities? And how do we define them? It is helpful to gain a better understanding of these phrases in the context of information security by first familiarizing yourself with their definitions.

Guidelines

A policy or procedure guideline is a document section that outlines the behavior or activity considered acceptable. It may come just like a suggestion or advice on the most effective approach to carrying out a specific task. It would be malleable and open to modification depending on the situation's specifics. Some information security experts may need clarification on the two terms, even though guidelines and best practices serve distinct responsibilities in the field. Organizations employ best practices to analyze risk, whereas policies outline the appropriate approach.

Procedures

The most granular level of documentation is comprised of security processes. Their attention to detail and meticulous approach to enforcing the required security principles and requirements of the rules are the distinguishing characteristics that make them who they are.

In most cases, what procedure must be followed to successfully install software and hardware for a computer network or a database? In addition, processes explain how can add new users, systems, and software to an organization. Hence, no two companies are the same, and it stands to reason that their procedures will likewise be distinct. However, several methods are likely to be typical across most companies.

Examples from the physical and environmental realms include preventing eavesdropping on Ethernet connections and keeping server rooms at a consistent temperature.

Conclusion

The responsibilities of individuals in charge of the organization's infrastructure can be clearly and well-organized, thanks to the administrative procedures. If DBAs were shown what occurs when they interfere with the company's firewall logs, it would be an excellent illustration of why they shouldn't do it in the first place. Configuration methods cover various components, including operating systems, firewalls, and routers.

Updated on: 26-Dec-2022

254 Views

Kickstart Your Career

Get certified by completing the course

Get Started
Advertisements