Download Accepable Use and User Policies - Information Systems and Internet

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cyber-security regulation wikipedia , lookup

Mobile security wikipedia , lookup

Password strength wikipedia , lookup

Wireless security wikipedia , lookup

Computer security wikipedia , lookup

Information security wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Unix security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Distributed firewall wikipedia , lookup

Social engineering (security) wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Information Security Policies:
User/Employee use policies
Overview
Format of policies
 Usage of policies
 Example of policies
 Policy cover areas
 References
 Homework
 Questions

2
Format of Policies

Purpose


Scope



Action can be taken once the policy is violated
Definitions


What can or can’t use for the system
Enforcement


Which part of the system is covering
Who is applying to the policies
Policy


The need of the policies
Define keywords in the policy
Revision History

Stated when and what have been changed
3
Usage of Policies

Policy


Standard


A document that outlines specific requirements or
rules that cover a single area
A collection of system-specific or proceduralspecific requirements that must be met by
everyone
Guideline


A collection of system specific or procedural
specific “suggestions” for best practice
Not require, but strongly recommended
4
Example of Policies
5
Example of Policies
6
Example of Policies
7
Policy cover areas







Acceptable Use
Information Sensitivity
Ethics
E-mail
Anti-Virus
Password
Connection
8
Acceptable Use Policy



General outline for all others policies
Protecting employees, partners and
companies from illegal or damaging actions
Applied to all computer related equipments



General use and ownership
Security and proprietary information
Unacceptable Use
9
Information Sensitivity Policy


To determine what information can/can’t be
disclosed to non-employee
Public



Declared for public knowledge
Freely be given to anyone without any possible damage
Confidential

Minimal Sensitivity:


More Sensitive:


General corporate information; some personal and technical
information
Business, financial, and most personnel information
Most Sensitive:

Trade secrets & marketing, operational, personnel, financial,
source code, & technical information integral to the success of
the company
10
Ethics Policy

Defines the means to establish a culture of
openness, trust and integrity

Executive Commitment


Employee Commitment


Promote a trustworthy and honest atmosphere
Maintaining Ethical Practices


Treat everyone fairly, have mutual respect
Company Awareness


Honesty and integrity must be top priority
Reinforce the importance of the integrity message
Unethical Behavior

Unauthorized use of company information integral to the
11
success of the company will not be tolerated
E-mail Policy

General usage


To prevent tarnishing the public image
Prohibited use


Personal Use


Can’t used for any disruptive or offensive messages
Can/Can’t use for personal usage
Monitoring


No privacy for store, send or receive massages
Monitor without prior notice
12
E-mail Policy

Retention


Determine how long for an e-mail to retain
Four main classifications





Instant Messenger Correspondence


Administrative correspondence – 4 years
Fiscal Correspondence – 4 years
General Correspondence – 1 years
Ephemeral Correspondence – Until read
Only apply to administrative and fiscal correspondence
Encrypted Communications

Stored in decrypted format
13
E-mail Policy

Automatically Forwarding


To prevent unauthorized or inadvertent disclose of
sensitive information
When


Approved by the appropriate manger
Sensitive information defined in Information Sensitivity
Policy is encrypted in accordance with Acceptable
Encryption Policy
14
Anti-Virus Policy

To prevent computer virus problems







Install anti-virus software
Update anti-virus software daily
Always maintain anti-virus software in autoprotect stage
Scan a storage media for virus before use it
Never open any e-mail from unknown source
Never download files from unknown source
Remove virus-infected computers from network
until verified as virus-free
15
Password Policy

A standard for creation of string password







Contain both upper and lower case characters
Contain digits and punctuation characters
At least eight alphanumeric characters long
Not based on personal information
Not a word in any language
Can be easily remembered
Frequency of change passwords
16
Password Policy

Protection of passwords







Never written down or stored on-line
Don’t reveal a password over the phone
Don’t reveal a password in an email message
Don’t reveal a password to the boss
Don’t reveal a password to co-workers
Don’t hint at the format of a password
Don’t share a password with family members
17
Connection Policy

Remote Access


Defines standards for connecting to the company’s
network from any host or network externally
General



Same consideration as on-site connection
General Internet access for recreational use for immediate
household is permitted
Requirement




Public/private keys with strong pass-phrases
Can’t connect to others network at the same time
Can’t provide their login or e-mail password to anyone
Installed the most up-to-date anti-virus software
18
Connection Policy

Analog/ISDN Line


Define standards for use of analog/ISDN lines for
Fax sending and receiving, and for connection to
computer
Scenarios & Business Impact


Facsimile Machines


Physically disconnect from computer/internal network
Computer-to-Analog Line Connections


Outside attacker attached to trusted network
A significant security threat
Requesting an Analog/ISDN Line

Stated why other secure connections can’t be use
19
Connection Policy

Dial-in Access



To protect information from being inadvertently
compromised by authorized personnel using a
dial-in connection
One-time password authentication
Connect to Company’s sensitive information


Analog and non-GSM digital cellular phones



Reasonable measure to protect assets
Signals are readily scanned unauthorized individuals
Monitor account activity
Disable account after no access for six months
20
Connection Policy

Extranet



Describes the third party organizations connect to
company network for the purpose of transacting
business related to the company
In best possible way, Least Access
Valid business justification


Point of Contact from Sponsoring Organnization


Approved by a project manager
Pertain the Third Party Connection Agreement
Establishing Connectivity

Provide a complete information of the proposed access
21
Connection Policy

Modifying Access



Terminating Access



Notifying the extranet management group
Security and Connectivity evolve accordingly
Access is no longer required
Terminating the circuit
Third Party Connection Agreement


Defines the standards and requirements, including legal
requirements, needed in order to interconnect a third
party organization’s network to the production network.
Must be signed by both parties
22
Connection Policy
23
Connection Policy

Virtual Private Network (VPN) Security






Define the requirements for Remote Access IPSec
or L2TP VPN connections to the company network
Force all traffic to and from PC over VPN tunnel
Dual tunneling is not allowed
24 hours absolute connection time limit
Automatically disconnected with 30 min. inactivity
Only approved VPN client can be used
24
Connection Policy

Wireless Communication


Defines standards for wireless systems used to
connect to the company network
Access Points and PC Cards


Approved Technology


Use approved products and security configurations
Encryption and Authentication


Register and approved by InfoSec
Drop all unauthenticated and unencrypted traffic
Setting the SSID

Should not contain any identifying informaiton
25
Reference

The SANS Security Policy Project


Information Security Policies & Computer Security Policy Directory


http://www.information-security-policies-and-standards.com
RFC 1244 – Site Security Handbook


http://www.sans.org/resources/policies
http://www.faqs.org/rfcs/rfc1244.html
Google

http://www.google.com
26
Reference
27
Reference
28
Homework
1.
Write an full versions of the policy based on
assignment 5 “Acceptable student use of the
GTS” with the format that presented
2.
Define presented usage of policies
Tips:



Policy document’s format is located in slide 3
Policy’s usage are located in slide 4
You may find more information in SANS
29
Questions
Any questions?
30