Week 10-Information Security
Week 10-Information Security
Week 10-Information Security
● Example:
ISO/IEC 27002:2022 Information security, cybersecurity and priv
acy protection — Information security controls
10 characters, I
uppercase, one special
character
Recommendations for
strong password
Purpose,
Scope,
Constraint,
applicability
COMPONENTS OF EISP
ISSUE SPECIFIC SECURITY
POLICY
1. An organizational policy that provides detailed, targeted
guidance to instruct all members of the organization in the use
of a resource, such as one of its processes or technologies.
● An ISSP may cover the following topics, among others:
Use of the Internet and World Wide Web,
BYOD
Email
Prohibitions against hacking or testing organization security controls,
etc.
ISSP
Example: Email
SYSTEM SPECIFIC SECURITY
POLICY
1. SysSPs often function as standards or procedures to be used
when configuring or maintaining systems.
2. SysSPs can be separated into two general groups, managerial
guidance SysSPs and technical specifications SysSPs, or they
can be combined into a single policy document that contains
elements of both.
SYSTEM SPECIFIC SECURITY
POLICY
Example 1: Workstation Security (For HIPAA) Policy
SYSTEM SPECIFIC SECURITY
POLICY
Example 2:
● a SysSP might describe the configuration and operation of a
network firewall.
● This document could include:
Core Focus: While ISO 27001 specifies what needs to be done, ISO
27002 offers how to do it by detailing best practices for each control. It
complements ISO 27001 certification by helping organizations align with
global best practices for security measures.
1. Framework Core
2. Framework Tiers
3. Framework Profile
FRAMEWORK CORE
Identify: Develop the organizational understanding to manage cybersecurity risk to
systems, assets, data, and capabilities.
Detect: Develop and implement the appropriate activities to identify the occurrence
of a cybersecurity event.
Respond: Develop and implement the appropriate activities to take action regarding
a detected cybersecurity event.
Recover: Develop and implement the appropriate activities to maintain plans for resilience
and to restore any capabilities or services that were impaired due to a cybersecurity
event.”
FRAMEWORK TIERS
The Framework then provides a self-defined set of tiers so
organizations can relate the maturity of their security
programs and implement corresponding measures and
functions.
Provide
authority and
guidance
BUSINESS IMPACT ANALYSIS
An investigation and assessment of the various adverse events
that can affect the organization, conducted as a preliminary
phase of the contingency planning process, which includes a
determination of how critical a system or set of information is to
the organization’s core processes and recovery priorities.