- Specific timeframes for changing passwords on the network devices
- Use of secure network protocols
- Firewalls at specific chokepoints in a network architecture
- Use of authentication servers to access network devices
Building a Security Policy System Security - The systems section is used to outline the specific settings required to secure a particular operating system or application
- For example, for Windows NT 4.0, it may be a requirement that every logical drive be installed with NTFS
- For a particular UNIX flavor, shadow password files may be required to hide user IDs and passwords from general users
Building a Security Policy Testing and Auditing - Specify requirements for vulnerability scanners, compliance checking tools, and other security tools run within the environment
- Require auditing logs on specific devices, periodic self-audits performed by the system administrators, and the use of security compliance checking tools
- Specify corporate auditing requirements, frequencies, and organizations
Security Resources Security Certifications Security Resources Web Resources Summary - The CIA triad categorizes aspects of information that must be protected from attacks: confidentiality, integrity, and availability.
- The PPP triad depicts security, privacy, and marketplace perception as three additional abstract concepts that should drive security efforts.
Summary Cont. - The first step in creating an effective security policy is to perform a risk assessment within the environment. A risk assessment consists of five steps:
- Check for existing security policies and processes
- Analyze, prioritize, and categorize resources
- Consider business concerns
- Evaluate existing security controls
- Leverage existing management and control architecture
- To estimate potential financial loss from security threats, the following formula works well by accounting for the most important cost factors associated with security: ALE = SLE * ARO.
- A security policy has three major benefits. It:
- Communicates a common vision for security throughout a company
- Represents a single easy-to-use source of security requirements
- Exists as a flexible document that should be updated at least annually to address new security threats
Summary Cont. - An effective security policy includes security requirements in the following areas:
- There are a number of security-related certifications to help security professionals quantify their knowledge on a resume.
- Every security professional must stay current about the latest threats through Web resources, mailing lists, and printed materials.
Do'stlaringiz bilan baham: |