IT Security Policy Development

An information security policy is a document that explains procedures designed to protect a company’s physical and information technology resources and assets.  It provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary. The first step in developing an information security policy is conducting a risk assessment to identify vulnerabilities and areas of concern. An effective policy will use information discovered during the assessment to explain its purpose, define the policy scope, indicate responsible individuals and departments, and include a method of measuring compliance. information security

 

Policy Introduction

Some employees may not understand the importance of managing confidential information, so an introductory section that explains the purpose of the document is essential. All employees need to understand the importance of reducing errors, reducing cost of downtime, improving recovery time and remaining compliant with regulations. The audience for this portion of the document includes every person in the organization.

Policy Scope

The policy scope identifies what needs to be protected, where it is and who is ultimately responsible. It addresses employees, technology, local and remote facilities and business processes. It may specify anti-virus programs, password rotation methodology and who has physical access to records.

Compliance

The responsibility and the compliance sections of the policy typically address individuals or departments. s may be charged with these duties, or they may be given to a dedicated security group or department.

Consider Information Security Vulnerabilities

A surprising number of companies develop information security through an ad hoc approach, leaving it up to users and their common sense. Companies doing this often experience virus attacks, have workstations disabled by malware and experience server downtime on a regular basis. Major corporations that lack a meaningful information security policy are also at risk of being victimized by organized crime.  The bigger the organization the more likely they will become a target.

There are many different types of attacks, such as phishing, keylogging, password hacking or the introduction of a Trojan virus that can mine databases for credit card numbers and passwords. Success using any of these methods can mean substantial loss of assets for the company and a negative impact on their overall reputation.

Information Security Policy Rollout

A typical rollout sequence begins with an announcement followed by meetings with management and staff. Training sessions may follow. A security baseline is established along with procedures and guidelines. Since the policy is a living document, procedures may be modified when monitoring identifies a weakness or non-compliance issue. This may lead to additional training for specific departments.

With Miami Helpdesk, we’ll help you determine the elements you need to consider when developing and maintaining an information security policy. We’ll design a suite of information security policy documents to cover all information security bases, which can be targeted for specific audiences such as management, technical staff and end users.

An IT security policy should:

  1. Protect people and information
  2. Set the rules for expected behavior by users, system administrators, management, and security personnel
  3. Authorize security personnel to monitor, probe, and investigate
  4. Define and authorize the consequences of violations
  5. Define the company consensus baseline stance on security
  6. Help minimize risk
  7. Help track compliance with regulations and legislation
  8. Ensure the confidentiality, integrity and availability of their data
  9. Provide a framework within which employees can work, are a reference for best practices, and are used to ensure users comply with legal requirements.

 

Contact us for assistance with your information security and information technology risk management needs!

 

Help-Desk