SlideShare ist ein Scribd-Unternehmen logo
1 von 6
Downloaden Sie, um offline zu lesen
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=56 1/6
Fundamentals of Data Security Policy in I.T.
Management - IT-Toolkits.org
We all know that I.T. stands for “information technology” and that’s no accident. In fact, it’s a
reflection of the primary mission of every I.T. organization – to provide the means and methods for
creating, storing, transmitting, printing and retrieving business related information. By design, this
operational mission is driven by the need to “protect”, which also includes preventing unauthorized
access, uncontrolled modification and unwarranted destruction. The priorities are self evident – data
integrity is vital, and vital needs must be met with purpose and committment. The tricky part is to
balance vital interests with the associated costs and operational overhead. This is the higher
purpose of data security and the goal of related policy development.
Data Security Practices and Policy Purpose
As discussed, “data security” provides the means by which business data and related information is
protected and preserved. This is realized in multiple ways, as listed below:
Data security technology and practices provide the means by which data can be safely created,
stored, transmitted, printed and retrieved.
Data security technology and practices provide the means by which data accuracy and integrity is
ensured and maintained.
Data security technology and practices provide the means to prevent and control unauthorized
access, modification and destruction.
Data security technology and practices provide the opportunity to minimize the risks and costs
associated with data loss, data corruption and unauthorized access.
Of course, the physical means of “securing data” are essential to the process. You must have the
technical ability (through hardware and software) to physically meet each of the above listed
objectives. But that will only take you part of the way. To realize all of the intended benefits,
data security practices must be “institutionalized” – i.e. integrated into the corporate
culture and made part of how a given organization works. This is achieved through the
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=56 2/6
development and implementation of effective “data security policy”. Policy is a governance
mechanism, used to translate tangible security objectives into organizational terms that can be
implemented and enforced. In the case of data security, related policies provide the “how, what, and
why” to communicate security objectives and promote expected compliance.
To fulfill this mission, data security policy must be developed and documented to reflect the following
components and answer the underlying formative questions:
Policy Purpose
What are the specific goals of this data security policy?
Why has the policy been created (considering the background events leading to policy
development)?
What will the policy accomplish considering data security goals and objectives?
Policy Basis
What is the underlying authority and/or organizational basis for this data security policy
(considering internal guidelines and/or external regulatory requirements)?
Do you have sufficient executive support to sufficiently enforce compliance with all of the policy
provisions?
Policy Scope
What are the organizational targets of the policy considering company-wide applicability,
division specific application, departmental application or location specific application?
What are the data targets of the policy considering the types of files, records, information and
applications covered by the policy?
Policy Stakeholders
Who are the policy stakeholders considering both individuals and groups who have a vested
interest in the policy and ability to influence the outcome?
What are the specific roles and responsibilities required to implement, administer and enforce
all policy terms, including all stated compliance obligations?
Security Means and Methods
What are the means and methods to be utilized to realize all identified data security
requirements, including data encryption, data access restrictions, security monitoring, data
classifications, userid requirements, password requirements, data storage mechanisms, and
related matters?
Compliance and Enforcement Guidelines
What are established guidelines for data security compliance?
Will there be any exceptions and/or waivers with regard to policy compliance? If so, what are
the terms under which exceptions and/or waivers will be granted?
How will compliance be enforced and what are the consequences for a failure to comply?
How will employees be provided with training relating to data security compliance?
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=56 3/6
What types of auditing procedures will be used to monitor and promote data security
compliance?
Take an Inclusive Approach to Policy Development
Every data security policy will benefit from an inclusive approach to development and implementation.
It takes a partnership between all of the interested and invested stakeholders to fully realize policy
relevance and enforcement. In the collaborative approach, the end-user partner defines the need
(the data to be protected and the business basis behind the security requirements). The IT partner
provides the technical means (and capability) by which the identified data security needs can be met.
These needs and means are then combined to form actionable policy through an “inclusive”
development process, characterized by input and collaboration at every stage:
Policy planning relies on input and information relating to data security needs and policy
objectives.
Policy preparation relies on the review of policy drafts, negotiation, and feedback relating to
specific terms and related obligations,
Policy implementation relies on the documented acceptance (and approval) of policy terms and
compliance obligations on the part of decision making stakeholders.
As policy development unfolds, checkpoints should be established to ensure that all decision making
stakeholders have been sufficiently engaged in the development process. Considering the long term
benefits of collaborative policy development (compliance is more readily secured when you have
advance buy-in), it’s always a good idea to create a “policy team” or committee as the organizational
vehicle for policy development. This policy team or committee should include members from all sides
– the end-user community, IT department, Legal department, Human Resources and any other
appropriate department with something to contribute. This will help to ensure that the policy delivered
represents all interests, incorporates all concerns, and has the greatest chance to succeed.
You may also like
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=56 4/6
Where is that laptop? Who has that printer? Do we have sufficient software licenses for every user?
These are the types of questions IT asset management is meant to answer. As an operational
practice, IT asset management serves multiple purposes, as reflected in the list below:
1. Asset management practices are used to minimize the risk that investments made in technology
(hardware, software and training) will be lost due to theft, destruction or other damage.
2. Asset management practices are used to ensure that technology assets are properly allocated to
end-users to optimize usage and workplace productivity.
3. Asset management practices are used to simplify technical support and maintenance
requirements.
4. Asset management practices are used to lower IT “cost of ownership” and maximize IT ROI.
5. Asset management practices are used to ensure that software licensing is in full compliance,
minimizing the risk of legal and regulatory problems.
6. Asset management practices are used to support “sister” policies for disaster recovery, email
usage, data security, and technology standards.
The Role of Asset Management Policy
Asset management practices define the actions to be taken to protect and preserve technology
assets – from physical locks on equipment to inventory tags. In conjunction, policy provides the “asset
management mindset“. This mindset acknowledges that”technology assets are important to us and
we take them seriously enough to put up with protective controls“. To realize all of the intended
benefits, this mindset must be integrated into daily operations and the corporate culture — and this
is achieved through adopted policy.
Once approved, asset management policies provide the governing authority to implement all aspects
of the asset management program. While policy terms and specifics will vary according to
organizational needs, the most effective policies are designed around (13) key components, as listed
below:
1. Asset Standards. To identify the specific hardware and software products (assets) to be used
and supported.
2. Configuration Standards. To identify how standardized hardware and software assets are to be
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=56 5/6
configured.
3. Variance Process. To establish the criteria and means by which product and configuration
standards can (and should) be waived.
4. Support of “Non- Standard” Assets. To establish the services that will IT provide for non-
standard products and configurations.
5. BOYD Guidelines. To establish the means for supporting “Bring Your Own” devices (tablets,
phones, notebooks, laptops).
6. Asset Procurement Guidelines. To identify the policies and procedures relating to the
acquisition, procurement and/or rental of technology assets.
7. Security Guidelines. To identify how physical and logical security will be provided for hardware
and software assets (locks, passwords, virus protection, etc.).
8. Software Licensing Guidelines. To keep track of asset licensing, ensuring compliance with all
relevant agreements, laws and regulations.
9. Technical Support and Maintenance Practices. To identify the processes to be followed for
asset related technical support, repair, service dispatch, preventative maintenance, and problem
escalation.
10. Configuration Management Guidelines. To identify related practices for asset configuration
management and change control to ensure consistent, updated configuration and timely updates
as may be required.
11. Asset Inventory Practices. To keep track of the location and assignment of all allocated
technology assets (hardware and software), including related record keeping.
12. Asset M.A.C. Practices. To govern requests and activities relating to physical moves, adds and
changes (M.A.C.) with regard to allocated hardware and software assets.
13. Asset Disposal Guidelines. To identify the processes to be followed when hardware and
software assets are no longer in use and disposal is appropriate (which can include a donation
program).
Your Top 10 Policy Planning Questions
As discussed, once they are documented, established (and approved), asset management policies
provide the means to “institutionalize” underlying objectives. Policy is a tool by which related practices
are implemented and executed, laying out the “what, how and why” of IT asset management. Not only
does policy provide the means for governance, it also provides the basis for related planning and
decision making. To realize all of these goals and benefits, policy planning must address the following
“top 10” planning questions:
1. What are your primary asset management goals?
2. What are the likely benefits to be realized from the standardized management of IT assets?
3. What are the negative aspects and/or risks associated with IT asset management?
4. Is executive management support required to plan and implement these practices?
5. If executive management support is required, are you likely to get it?
6. How would any chosen policies and procedures be implemented and executed?
7. Do you have the resources to plan, implement, and execute any chosen policies and procedures?
2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org
http://it-toolkits.org/blog/?p=56 6/6
8. What are the likely costs associated with managing information technology assets?
9. What are the likely objections to adopted asset management practices and how can they be
addressed?
10. What are the consequences of inaction with regard to managing IT assets?
You may also like

Weitere Àhnliche Inhalte

Was ist angesagt?

Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...ARMA International
 
Information Governance Program
Information Governance ProgramInformation Governance Program
Information Governance ProgramBohdiman
 
Information Security Governance #2A
Information Security Governance #2A Information Security Governance #2A
Information Security Governance #2A Marius FAILLOT DEVARRE
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsRd. R. Agung Trimanda
 
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...ijcsit
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security StrategyInfo-Tech Research Group
 
Establishing an information governance program
Establishing an information governance programEstablishing an information governance program
Establishing an information governance programLouise Spiteri
 
Whitepaper best practices for integrated physical security supporti

Whitepaper best practices for integrated physical security supporti
Whitepaper best practices for integrated physical security supporti

Whitepaper best practices for integrated physical security supporti
Basavaraj Dodamani
 
SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 Hybrid Cloud
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)Kathy_67
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...David Kearney
 

Was ist angesagt? (20)

Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
Nick Inglis - The Maturing Of An Industry: Information Governance (Opening Ke...
 
Information Governance Program
Information Governance ProgramInformation Governance Program
Information Governance Program
 
Information Security Governance #2A
Information Security Governance #2A Information Security Governance #2A
Information Security Governance #2A
 
Cisa 2013 ch2
Cisa 2013 ch2Cisa 2013 ch2
Cisa 2013 ch2
 
Cissp notes
Cissp notesCissp notes
Cissp notes
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Cisa 2013 ch4
Cisa 2013 ch4Cisa 2013 ch4
Cisa 2013 ch4
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
Cisa 2013 ch0
Cisa 2013 ch0Cisa 2013 ch0
Cisa 2013 ch0
 
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...Return on Investment of Diversity and Inclusion Initiatives in Information Go...
Return on Investment of Diversity and Inclusion Initiatives in Information Go...
 
Information Governance
Information GovernanceInformation Governance
Information Governance
 
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
RANKING CRITERIA OF ENTERPRISE INFORMATION SECURITY ARCHITECTURE USING FUZZY ...
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Establishing an information governance program
Establishing an information governance programEstablishing an information governance program
Establishing an information governance program
 
Cisa 2013 ch3
Cisa 2013 ch3Cisa 2013 ch3
Cisa 2013 ch3
 
Whitepaper best practices for integrated physical security supporti

Whitepaper best practices for integrated physical security supporti
Whitepaper best practices for integrated physical security supporti

Whitepaper best practices for integrated physical security supporti

 
SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016 SME- Developing an information governance strategy 2016
SME- Developing an information governance strategy 2016
 
Final Exam Case Study (3)
Final Exam   Case Study (3)Final Exam   Case Study (3)
Final Exam Case Study (3)
 
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
Information Governance, Managing Data To Lower Risk and Costs, and E-Discover...
 
Principles of Holistic Information Governance
Principles of Holistic Information GovernancePrinciples of Holistic Information Governance
Principles of Holistic Information Governance
 

Andere mochten auch

Hw cresume2016
Hw cresume2016Hw cresume2016
Hw cresume2016Henry Codd
 
Positive conditioning techniques in animal training vs aversive technique
Positive conditioning techniques in animal training vs aversive techniquePositive conditioning techniques in animal training vs aversive technique
Positive conditioning techniques in animal training vs aversive techniquesheetal chand
 
Taller RV AUMENTAME EDU 16
Taller RV AUMENTAME EDU 16 Taller RV AUMENTAME EDU 16
Taller RV AUMENTAME EDU 16 Gregorio Rosa
 
A guide to creating a quality project schedule it-toolkits
A guide to creating a quality project schedule   it-toolkitsA guide to creating a quality project schedule   it-toolkits
A guide to creating a quality project schedule it-toolkitsIT-Toolkits.org
 
AL 1.1 queda livre- FĂ­sica 11Âș
AL 1.1 queda livre- FĂ­sica 11ÂșAL 1.1 queda livre- FĂ­sica 11Âș
AL 1.1 queda livre- FĂ­sica 11ÂșGoreti Cachide
 
Multi-magazzino e depositi WinCoge
Multi-magazzino e depositi WinCogeMulti-magazzino e depositi WinCoge
Multi-magazzino e depositi WinCogeandreaWinCoge
 
Bem aventurados
Bem aventuradosBem aventurados
Bem aventuradosANA SANTOS
 
Ashish matrimonial proposal
Ashish matrimonial proposalAshish matrimonial proposal
Ashish matrimonial proposalssjashish
 
Restaurants with catering and events in Palo Alto
Restaurants with catering and events in Palo AltoRestaurants with catering and events in Palo Alto
Restaurants with catering and events in Palo Altomoroccorestaurant122
 
ALIEN VS PREDADOR
ALIEN VS PREDADORALIEN VS PREDADOR
ALIEN VS PREDADORbrianer
 
Como fazer cabos de rede
Como fazer cabos de redeComo fazer cabos de rede
Como fazer cabos de redeAlessandro Fazenda
 

Andere mochten auch (14)

Hw cresume2016
Hw cresume2016Hw cresume2016
Hw cresume2016
 
Positive conditioning techniques in animal training vs aversive technique
Positive conditioning techniques in animal training vs aversive techniquePositive conditioning techniques in animal training vs aversive technique
Positive conditioning techniques in animal training vs aversive technique
 
Taller RV AUMENTAME EDU 16
Taller RV AUMENTAME EDU 16 Taller RV AUMENTAME EDU 16
Taller RV AUMENTAME EDU 16
 
MRA Portfolio
MRA PortfolioMRA Portfolio
MRA Portfolio
 
A guide to creating a quality project schedule it-toolkits
A guide to creating a quality project schedule   it-toolkitsA guide to creating a quality project schedule   it-toolkits
A guide to creating a quality project schedule it-toolkits
 
AL 1.1 queda livre- FĂ­sica 11Âș
AL 1.1 queda livre- FĂ­sica 11ÂșAL 1.1 queda livre- FĂ­sica 11Âș
AL 1.1 queda livre- FĂ­sica 11Âș
 
Multi-magazzino e depositi WinCoge
Multi-magazzino e depositi WinCogeMulti-magazzino e depositi WinCoge
Multi-magazzino e depositi WinCoge
 
Bem aventurados
Bem aventuradosBem aventurados
Bem aventurados
 
Ashish matrimonial proposal
Ashish matrimonial proposalAshish matrimonial proposal
Ashish matrimonial proposal
 
Motherboard
MotherboardMotherboard
Motherboard
 
Restaurants with catering and events in Palo Alto
Restaurants with catering and events in Palo AltoRestaurants with catering and events in Palo Alto
Restaurants with catering and events in Palo Alto
 
iIt course
iIt courseiIt course
iIt course
 
ALIEN VS PREDADOR
ALIEN VS PREDADORALIEN VS PREDADOR
ALIEN VS PREDADOR
 
Como fazer cabos de rede
Como fazer cabos de redeComo fazer cabos de rede
Como fazer cabos de rede
 

Ähnlich wie Protecting business interests with policies for it asset management it-toolkits

Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfkimangeloullero
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, aMaximaSheffield592
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Bonagiri Rajitha
 
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)Nick Inglis
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFLaurie Mosca-Cocca
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxamit657720
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxmccormicknadine86
 
71 Information Governance Policy Development .docx
71 Information Governance Policy Development      .docx71 Information Governance Policy Development      .docx
71 Information Governance Policy Development .docxsleeperharwell
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxManushiKhatri
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfalokkesh
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security ManagementMark Conway
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policiesmrmwood
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...GrapesTech Solutions
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 

Ähnlich wie Protecting business interests with policies for it asset management it-toolkits (20)

Chapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdfChapter 1-3 - Information Assurance Basics.pptx.pdf
Chapter 1-3 - Information Assurance Basics.pptx.pdf
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
CHAPTER 5 Security Policies, Standards, Procedures, a
CHAPTER  5 Security Policies, Standards, Procedures, aCHAPTER  5 Security Policies, Standards, Procedures, a
CHAPTER 5 Security Policies, Standards, Procedures, a
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
Importanceofasecuritypolicy 13281642117262-phpapp01-120202003227-phpapp01 (1)
 
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
The Maturing of an Industry: Information Governance (#InfoGov14 Keynote)
 
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDFGT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
GT11_ATT_GuideBk_CyberSecurity_FINAL_V.PDF
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
71 Information Governance Policy Development .docx
71 Information Governance Policy Development      .docx71 Information Governance Policy Development      .docx
71 Information Governance Policy Development .docx
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
unit 3 security plans and policies.pptx
unit 3 security plans and policies.pptxunit 3 security plans and policies.pptx
unit 3 security plans and policies.pptx
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
A to Z of Information Security Management
A to Z of Information Security ManagementA to Z of Information Security Management
A to Z of Information Security Management
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
develop security policy
develop security policydevelop security policy
develop security policy
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 

Mehr von IT-Toolkits.org

Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsIT-Toolkits.org
 
Information Technology & Its Role in the Modern Organization
Information Technology & Its Role in the  Modern OrganizationInformation Technology & Its Role in the  Modern Organization
Information Technology & Its Role in the Modern OrganizationIT-Toolkits.org
 
It Organization Management : Revisiting Centralization
It Organization Management : Revisiting CentralizationIt Organization Management : Revisiting Centralization
It Organization Management : Revisiting CentralizationIT-Toolkits.org
 
It change management
It change managementIt change management
It change managementIT-Toolkits.org
 
P2 how to develop an it change management program
P2 how to develop an it change management programP2 how to develop an it change management program
P2 how to develop an it change management programIT-Toolkits.org
 
25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support tools25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support toolsIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
The basics of managing i.t
The basics of managing i.tThe basics of managing i.t
The basics of managing i.tIT-Toolkits.org
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templatesIT-Toolkits.org
 
What is value added- it management_ - it management templates
What is  value added- it management_ - it management templatesWhat is  value added- it management_ - it management templates
What is value added- it management_ - it management templatesIT-Toolkits.org
 
7 steps to business and it alignment it management templates
7 steps to business and it alignment   it management templates7 steps to business and it alignment   it management templates
7 steps to business and it alignment it management templatesIT-Toolkits.org
 
Relevant it – it solutions to bridge the gap between business and it it man...
Relevant it – it solutions to bridge the gap between business and it   it man...Relevant it – it solutions to bridge the gap between business and it   it man...
Relevant it – it solutions to bridge the gap between business and it it man...IT-Toolkits.org
 
Finding a common ground between finance and it it management templates
Finding a common ground between finance and it   it management templatesFinding a common ground between finance and it   it management templates
Finding a common ground between finance and it it management templatesIT-Toolkits.org
 
How to write your company's it security policy it-toolkits
How to write your company's it security policy   it-toolkitsHow to write your company's it security policy   it-toolkits
How to write your company's it security policy it-toolkitsIT-Toolkits.org
 
Email policies tools to govern usage, access and etiquette it-toolkits
Email policies  tools to govern usage, access and etiquette   it-toolkitsEmail policies  tools to govern usage, access and etiquette   it-toolkits
Email policies tools to govern usage, access and etiquette it-toolkitsIT-Toolkits.org
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkitsIT-Toolkits.org
 
Help desk ticket categories create help desk ticket classification it-tool...
Help desk ticket categories  create help desk ticket classification   it-tool...Help desk ticket categories  create help desk ticket classification   it-tool...
Help desk ticket categories create help desk ticket classification it-tool...IT-Toolkits.org
 
Help desk mission and vision statements. it-toolkits
Help desk mission and vision statements.   it-toolkitsHelp desk mission and vision statements.   it-toolkits
Help desk mission and vision statements. it-toolkitsIT-Toolkits.org
 
Help desk problem management it-toolkits
Help desk problem management   it-toolkitsHelp desk problem management   it-toolkits
Help desk problem management it-toolkitsIT-Toolkits.org
 

Mehr von IT-Toolkits.org (20)

Risk Management & Information Security Management Systems
Risk Management & Information Security Management SystemsRisk Management & Information Security Management Systems
Risk Management & Information Security Management Systems
 
Information Technology & Its Role in the Modern Organization
Information Technology & Its Role in the  Modern OrganizationInformation Technology & Its Role in the  Modern Organization
Information Technology & Its Role in the Modern Organization
 
It Organization Management : Revisiting Centralization
It Organization Management : Revisiting CentralizationIt Organization Management : Revisiting Centralization
It Organization Management : Revisiting Centralization
 
It change management
It change managementIt change management
It change management
 
P2 how to develop an it change management program
P2 how to develop an it change management programP2 how to develop an it change management program
P2 how to develop an it change management program
 
25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support tools25 important considerations for selecting new customer support tools
25 important considerations for selecting new customer support tools
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
The basics of managing i.t
The basics of managing i.tThe basics of managing i.t
The basics of managing i.t
 
It management audits it management templates
It management audits   it management templatesIt management audits   it management templates
It management audits it management templates
 
What is value added- it management_ - it management templates
What is  value added- it management_ - it management templatesWhat is  value added- it management_ - it management templates
What is value added- it management_ - it management templates
 
7 steps to business and it alignment it management templates
7 steps to business and it alignment   it management templates7 steps to business and it alignment   it management templates
7 steps to business and it alignment it management templates
 
Relevant it – it solutions to bridge the gap between business and it it man...
Relevant it – it solutions to bridge the gap between business and it   it man...Relevant it – it solutions to bridge the gap between business and it   it man...
Relevant it – it solutions to bridge the gap between business and it it man...
 
Finding a common ground between finance and it it management templates
Finding a common ground between finance and it   it management templatesFinding a common ground between finance and it   it management templates
Finding a common ground between finance and it it management templates
 
How to write your company's it security policy it-toolkits
How to write your company's it security policy   it-toolkitsHow to write your company's it security policy   it-toolkits
How to write your company's it security policy it-toolkits
 
Email policies tools to govern usage, access and etiquette it-toolkits
Email policies  tools to govern usage, access and etiquette   it-toolkitsEmail policies  tools to govern usage, access and etiquette   it-toolkits
Email policies tools to govern usage, access and etiquette it-toolkits
 
Why do you need an it policy it-toolkits
Why do you need an it policy     it-toolkitsWhy do you need an it policy     it-toolkits
Why do you need an it policy it-toolkits
 
Help desk ticket categories create help desk ticket classification it-tool...
Help desk ticket categories  create help desk ticket classification   it-tool...Help desk ticket categories  create help desk ticket classification   it-tool...
Help desk ticket categories create help desk ticket classification it-tool...
 
Help desk mission and vision statements. it-toolkits
Help desk mission and vision statements.   it-toolkitsHelp desk mission and vision statements.   it-toolkits
Help desk mission and vision statements. it-toolkits
 
Help desk problem management it-toolkits
Help desk problem management   it-toolkitsHelp desk problem management   it-toolkits
Help desk problem management it-toolkits
 

KĂŒrzlich hochgeladen

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

KĂŒrzlich hochgeladen (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls đŸ„° 8617370543 Service Offer VIP Hot Model
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Protecting business interests with policies for it asset management it-toolkits

  • 1. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=56 1/6 Fundamentals of Data Security Policy in I.T. Management - IT-Toolkits.org We all know that I.T. stands for “information technology” and that’s no accident. In fact, it’s a reflection of the primary mission of every I.T. organization – to provide the means and methods for creating, storing, transmitting, printing and retrieving business related information. By design, this operational mission is driven by the need to “protect”, which also includes preventing unauthorized access, uncontrolled modification and unwarranted destruction. The priorities are self evident – data integrity is vital, and vital needs must be met with purpose and committment. The tricky part is to balance vital interests with the associated costs and operational overhead. This is the higher purpose of data security and the goal of related policy development. Data Security Practices and Policy Purpose As discussed, “data security” provides the means by which business data and related information is protected and preserved. This is realized in multiple ways, as listed below: Data security technology and practices provide the means by which data can be safely created, stored, transmitted, printed and retrieved. Data security technology and practices provide the means by which data accuracy and integrity is ensured and maintained. Data security technology and practices provide the means to prevent and control unauthorized access, modification and destruction. Data security technology and practices provide the opportunity to minimize the risks and costs associated with data loss, data corruption and unauthorized access. Of course, the physical means of “securing data” are essential to the process. You must have the technical ability (through hardware and software) to physically meet each of the above listed objectives. But that will only take you part of the way. To realize all of the intended benefits, data security practices must be “institutionalized” – i.e. integrated into the corporate culture and made part of how a given organization works. This is achieved through the
  • 2. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=56 2/6 development and implementation of effective “data security policy”. Policy is a governance mechanism, used to translate tangible security objectives into organizational terms that can be implemented and enforced. In the case of data security, related policies provide the “how, what, and why” to communicate security objectives and promote expected compliance. To fulfill this mission, data security policy must be developed and documented to reflect the following components and answer the underlying formative questions: Policy Purpose What are the specific goals of this data security policy? Why has the policy been created (considering the background events leading to policy development)? What will the policy accomplish considering data security goals and objectives? Policy Basis What is the underlying authority and/or organizational basis for this data security policy (considering internal guidelines and/or external regulatory requirements)? Do you have sufficient executive support to sufficiently enforce compliance with all of the policy provisions? Policy Scope What are the organizational targets of the policy considering company-wide applicability, division specific application, departmental application or location specific application? What are the data targets of the policy considering the types of files, records, information and applications covered by the policy? Policy Stakeholders Who are the policy stakeholders considering both individuals and groups who have a vested interest in the policy and ability to influence the outcome? What are the specific roles and responsibilities required to implement, administer and enforce all policy terms, including all stated compliance obligations? Security Means and Methods What are the means and methods to be utilized to realize all identified data security requirements, including data encryption, data access restrictions, security monitoring, data classifications, userid requirements, password requirements, data storage mechanisms, and related matters? Compliance and Enforcement Guidelines What are established guidelines for data security compliance? Will there be any exceptions and/or waivers with regard to policy compliance? If so, what are the terms under which exceptions and/or waivers will be granted? How will compliance be enforced and what are the consequences for a failure to comply? How will employees be provided with training relating to data security compliance?
  • 3. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=56 3/6 What types of auditing procedures will be used to monitor and promote data security compliance? Take an Inclusive Approach to Policy Development Every data security policy will benefit from an inclusive approach to development and implementation. It takes a partnership between all of the interested and invested stakeholders to fully realize policy relevance and enforcement. In the collaborative approach, the end-user partner defines the need (the data to be protected and the business basis behind the security requirements). The IT partner provides the technical means (and capability) by which the identified data security needs can be met. These needs and means are then combined to form actionable policy through an “inclusive” development process, characterized by input and collaboration at every stage: Policy planning relies on input and information relating to data security needs and policy objectives. Policy preparation relies on the review of policy drafts, negotiation, and feedback relating to specific terms and related obligations, Policy implementation relies on the documented acceptance (and approval) of policy terms and compliance obligations on the part of decision making stakeholders. As policy development unfolds, checkpoints should be established to ensure that all decision making stakeholders have been sufficiently engaged in the development process. Considering the long term benefits of collaborative policy development (compliance is more readily secured when you have advance buy-in), it’s always a good idea to create a “policy team” or committee as the organizational vehicle for policy development. This policy team or committee should include members from all sides – the end-user community, IT department, Legal department, Human Resources and any other appropriate department with something to contribute. This will help to ensure that the policy delivered represents all interests, incorporates all concerns, and has the greatest chance to succeed. You may also like
  • 4. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=56 4/6 Where is that laptop? Who has that printer? Do we have sufficient software licenses for every user? These are the types of questions IT asset management is meant to answer. As an operational practice, IT asset management serves multiple purposes, as reflected in the list below: 1. Asset management practices are used to minimize the risk that investments made in technology (hardware, software and training) will be lost due to theft, destruction or other damage. 2. Asset management practices are used to ensure that technology assets are properly allocated to end-users to optimize usage and workplace productivity. 3. Asset management practices are used to simplify technical support and maintenance requirements. 4. Asset management practices are used to lower IT “cost of ownership” and maximize IT ROI. 5. Asset management practices are used to ensure that software licensing is in full compliance, minimizing the risk of legal and regulatory problems. 6. Asset management practices are used to support “sister” policies for disaster recovery, email usage, data security, and technology standards. The Role of Asset Management Policy Asset management practices define the actions to be taken to protect and preserve technology assets – from physical locks on equipment to inventory tags. In conjunction, policy provides the “asset management mindset“. This mindset acknowledges that”technology assets are important to us and we take them seriously enough to put up with protective controls“. To realize all of the intended benefits, this mindset must be integrated into daily operations and the corporate culture — and this is achieved through adopted policy. Once approved, asset management policies provide the governing authority to implement all aspects of the asset management program. While policy terms and specifics will vary according to organizational needs, the most effective policies are designed around (13) key components, as listed below: 1. Asset Standards. To identify the specific hardware and software products (assets) to be used and supported. 2. Configuration Standards. To identify how standardized hardware and software assets are to be
  • 5. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=56 5/6 configured. 3. Variance Process. To establish the criteria and means by which product and configuration standards can (and should) be waived. 4. Support of “Non- Standard” Assets. To establish the services that will IT provide for non- standard products and configurations. 5. BOYD Guidelines. To establish the means for supporting “Bring Your Own” devices (tablets, phones, notebooks, laptops). 6. Asset Procurement Guidelines. To identify the policies and procedures relating to the acquisition, procurement and/or rental of technology assets. 7. Security Guidelines. To identify how physical and logical security will be provided for hardware and software assets (locks, passwords, virus protection, etc.). 8. Software Licensing Guidelines. To keep track of asset licensing, ensuring compliance with all relevant agreements, laws and regulations. 9. Technical Support and Maintenance Practices. To identify the processes to be followed for asset related technical support, repair, service dispatch, preventative maintenance, and problem escalation. 10. Configuration Management Guidelines. To identify related practices for asset configuration management and change control to ensure consistent, updated configuration and timely updates as may be required. 11. Asset Inventory Practices. To keep track of the location and assignment of all allocated technology assets (hardware and software), including related record keeping. 12. Asset M.A.C. Practices. To govern requests and activities relating to physical moves, adds and changes (M.A.C.) with regard to allocated hardware and software assets. 13. Asset Disposal Guidelines. To identify the processes to be followed when hardware and software assets are no longer in use and disposal is appropriate (which can include a donation program). Your Top 10 Policy Planning Questions As discussed, once they are documented, established (and approved), asset management policies provide the means to “institutionalize” underlying objectives. Policy is a tool by which related practices are implemented and executed, laying out the “what, how and why” of IT asset management. Not only does policy provide the means for governance, it also provides the basis for related planning and decision making. To realize all of these goals and benefits, policy planning must address the following “top 10” planning questions: 1. What are your primary asset management goals? 2. What are the likely benefits to be realized from the standardized management of IT assets? 3. What are the negative aspects and/or risks associated with IT asset management? 4. Is executive management support required to plan and implement these practices? 5. If executive management support is required, are you likely to get it? 6. How would any chosen policies and procedures be implemented and executed? 7. Do you have the resources to plan, implement, and execute any chosen policies and procedures?
  • 6. 2/29/2016 Fundamentals of Data SecurityPolicyin I.T. Management - IT-Toolkits.org http://it-toolkits.org/blog/?p=56 6/6 8. What are the likely costs associated with managing information technology assets? 9. What are the likely objections to adopted asset management practices and how can they be addressed? 10. What are the consequences of inaction with regard to managing IT assets? You may also like