{"id":105,"date":"2017-04-14T15:50:00","date_gmt":"2017-04-14T15:50:00","guid":{"rendered":"https:\/\/www.7sec.com\/blog\/?p=105"},"modified":"2021-06-10T13:35:36","modified_gmt":"2021-06-10T13:35:36","slug":"develop-policies-for-an-all-round-approach-to-information-security","status":"publish","type":"post","link":"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/","title":{"rendered":"Develop Policies for an All-round Approach to Information Security"},"content":{"rendered":"\r\n<p>Taking risks is something we do every single minute, sometimes without even realizing it. A risk may be something as little as talking to somebody, let alone major decision-making or something life-defining. Taking risks also relates heavily to IT security, therefore a countermeasure is required \u2013 a policy.<\/p>\r\n\r\n\r\n\r\n<p>Information Security Policies are an important administrative security control designed to avoid, counteract or minimize IT security risks. They are an integral and inseparable part of the multitude of possible security controls, without which one cannot claim an effective implementation of any meaningful security actions. Organizations need Security Policy, Standards, and Procedures to enforce Information Security in a structured way.<\/p>\r\n\r\n\r\n\r\n<p>Defining corporate security policies, basing them on industry standards, measuring compliance, and outsourced services are keys to successful policy management.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">THE RULES OF POLICIES DEVELOPMENT<\/h4>\r\n\r\n\r\n\r\n<p>Security policy and supporting documents must be not only developed but also implemented. The execution of all documents must be ensured.<\/p>\r\n\r\n\r\n\r\n<p>A clear and understandable procedure should be developed and implemented for applying sanctions to those who fail to comply with the policy. So staff knows not only what is expected of them, but what are the consequences of non-compliance.<\/p>\r\n\r\n\r\n\r\n<p>Policy &#8211; \u00a0Information Security Policy is a comprehensive statement made by the company\u2019s senior management, indicating the role of security in the organization. The Policy is independent in terms of technology and solutions. It outlines the purpose and mission of security and achieves tasks such as defining the assets considered valuable, empowering the security group and its activities, serving as a basis in the process of security-related conflict resolution, capturing the goals and objectives relating to safety, outlining the personal responsibility of staff members, helping prevent unexplained events, defining the boundaries and functions of the security group, etc.<\/p>\r\n\r\n\r\n\r\n<p>Standards\u00a0\u2013 mandatory actions or rules. Standards help, support, and develop policies in certain areas. Standards may be internal or external (e.g. legislation). Standards can, for example, indicate how to use the software and hardware or how to deal with users. They can ensure the uniformity of technologies, applications, settings, and procedures throughout the company.<\/p>\r\n\r\n\r\n\r\n<p>Procedures \u2013 detailed step-by-step descriptions of tasks performed to achieve a certain goal. Steps can be performed by users, IT professionals, security personnel, and other staff members dealing with specific tasks.<\/p>\r\n\r\n\r\n\r\n<p>Procedures occupy the lowest level in the chain of policies, as they relate to computers and users and describe certain concrete steps and also how the policies will actually be implemented in the production environment. Procedures should be detailed enough to be understandable and useful.<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-181\" src=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png\" alt=\"\" width=\"465\" height=\"353\" srcset=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png 760w, https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram-300x228.png 300w\" sizes=\"auto, (max-width: 465px) 85vw, 465px\" \/><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<p>&nbsp;<\/p>\r\n\r\n\r\n\r\n<p>Guidelines\u00a0&#8211; describe the recommended actions and operating instructions for users, IT professionals, and other staff members, when the appropriate Standards do not apply. Recommendations may relate to technological methods, personnel, or physical security. Recommendations, as opposed to mandatory enforcement of strict Standards, show the basic approach of having some flexibility in unforeseen circumstances.<\/p>\r\n\r\n\r\n\r\n<p>Baselines\u00a0&#8211; uniform ways of implementing a given safeguard. The system must meet the baseline described by benchmarks. Baselines are discretionary; it is acceptable to implement a safeguard without following benchmarks, as long as it is implemented to poses a level of security at least as secure as if using benchmarks.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">THE INFORMATION SECURITY POLICY FRAMEWORK<\/h4>\r\n\r\n\r\n\r\n<p>Each document listed above has a different target audience within the business and therefore, should never be combined into one document. Instead, there should be several documents, that together form the concept of an Information Security Policy framework.<\/p>\r\n\r\n\r\n\r\n<p>This framework is illustrated in the diagram above, with each level of the framework supporting the levels above it. Some small organizations tend to define Security Policies from the bottom up, starting with the capabilities of the tools at hand. Medium and large enterprises know that sound Security Policies Development begins from the top down.<\/p>\r\n\r\n\r\n\r\n<h4 class=\"wp-block-heading\">HOW TO START with the development of policies<\/h4>\r\n\r\n\r\n\r\n<p>Practice shows that without top management\u2019s participation and visionary input, Information Security Policies Development is practically impossible.<\/p>\r\n\r\n\r\n\r\n<p>Any endeavor in Information Security must, at least, be fully supported by top management. Ideally, the seniors of the company will initiate the changes in strategy and will be actively involved in the Information Security Policy development process.<\/p>\r\n\r\n\r\n\r\n<p>No matter how talented and prepared the Information Security person you hire, they will not be able to affect the necessary changes.<\/p>\r\n\r\n\r\n\r\n<p>Top management must be involved in the entire program development in order to ensure comprehensiveness, full compliance by staff, and sanctioning for non-compliance \u2013 it is only effective when supervised and executed under an autocratic approach.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>Taking risks is something we do every single minute, sometimes without even realizing it. A risk may be something as little as talking to somebody, let alone major decision-making or something life-defining. Taking risks also relates heavily to IT security, therefore a countermeasure is required \u2013 a policy. Information Security Policies are an important administrative &hellip; <a href=\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Develop Policies for an All-round Approach to Information Security&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,4],"tags":[26,42,40,27,28,41],"class_list":["post-105","post","type-post","status-publish","format-standard","hentry","category-compliance","category-it-governance","tag-information-security","tag-information-security-policies-development","tag-information-security-policy","tag-it-security","tag-security-policies","tag-security-policies-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Develop Policies for an All-round Approach to Information Security - Information Security Blog - 7Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Develop Policies for an All-round Approach to Information Security - Information Security Blog - 7Security\" \/>\n<meta property=\"og:description\" content=\"Taking risks is something we do every single minute, sometimes without even realizing it. A risk may be something as little as talking to somebody, let alone major decision-making or something life-defining. Taking risks also relates heavily to IT security, therefore a countermeasure is required \u2013 a policy. Information Security Policies are an important administrative &hellip; Continue reading &quot;Develop Policies for an All-round Approach to Information Security&quot;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Security Blog - 7Security\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-14T15:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-10T13:35:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png\" \/>\n<meta name=\"author\" content=\"madmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"madmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/\",\"url\":\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/\",\"name\":\"Develop Policies for an All-round Approach to Information Security - Information Security Blog - 7Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png\",\"datePublished\":\"2017-04-14T15:50:00+00:00\",\"dateModified\":\"2021-06-10T13:35:36+00:00\",\"author\":{\"@id\":\"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/#primaryimage\",\"url\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png\",\"contentUrl\":\"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png\",\"width\":760,\"height\":578},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.7sec.com\/blog\/#website\",\"url\":\"https:\/\/www.7sec.com\/blog\/\",\"name\":\"Information Security Blog - 7Security\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.7sec.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65\",\"name\":\"madmin\",\"sameAs\":[\"https:\/\/www.7sec.com\/blog\"],\"url\":\"https:\/\/www.7sec.com\/blog\/author\/madmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Develop Policies for an All-round Approach to Information Security - Information Security Blog - 7Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/","og_locale":"en_US","og_type":"article","og_title":"Develop Policies for an All-round Approach to Information Security - Information Security Blog - 7Security","og_description":"Taking risks is something we do every single minute, sometimes without even realizing it. A risk may be something as little as talking to somebody, let alone major decision-making or something life-defining. Taking risks also relates heavily to IT security, therefore a countermeasure is required \u2013 a policy. Information Security Policies are an important administrative &hellip; Continue reading \"Develop Policies for an All-round Approach to Information Security\"","og_url":"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/","og_site_name":"Information Security Blog - 7Security","article_published_time":"2017-04-14T15:50:00+00:00","article_modified_time":"2021-06-10T13:35:36+00:00","og_image":[{"url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png","type":"","width":"","height":""}],"author":"madmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"madmin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/","url":"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/","name":"Develop Policies for an All-round Approach to Information Security - Information Security Blog - 7Security","isPartOf":{"@id":"https:\/\/www.7sec.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/#primaryimage"},"image":{"@id":"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png","datePublished":"2017-04-14T15:50:00+00:00","dateModified":"2021-06-10T13:35:36+00:00","author":{"@id":"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.7sec.com\/blog\/develop-policies-for-an-all-round-approach-to-information-security\/#primaryimage","url":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png","contentUrl":"https:\/\/www.7sec.com\/blog\/wp-content\/uploads\/2017\/04\/policy_diagram.png","width":760,"height":578},{"@type":"WebSite","@id":"https:\/\/www.7sec.com\/blog\/#website","url":"https:\/\/www.7sec.com\/blog\/","name":"Information Security Blog - 7Security","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.7sec.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.7sec.com\/blog\/#\/schema\/person\/1abb37c561f43ccf0296b04701971f65","name":"madmin","sameAs":["https:\/\/www.7sec.com\/blog"],"url":"https:\/\/www.7sec.com\/blog\/author\/madmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/comments?post=105"}],"version-history":[{"count":7,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/105\/revisions"}],"predecessor-version":[{"id":339,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/posts\/105\/revisions\/339"}],"wp:attachment":[{"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/media?parent=105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/categories?post=105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.7sec.com\/blog\/wp-json\/wp\/v2\/tags?post=105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}