One of the most difficult duties the majority of information security professionals face is the development, implementation...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
and enforcement of information security policies. While many organizations accept the fact that security policies are needed, more often than not projects that address policy issues are given a low priority, insufficient resources and inadequate funding. In many cases, information security professionals are left on their own to create and implement policy, train staff and run enforcement.
Until recently, many information security professionals, although recognizing security polices were important, were willing to accept that policies were a low priority for the organization. With the change in the legislative climate (the passing of SOX, GLBA and HIPAA), organizations can no longer afford to relegate information security policies to the back burner. Information security professionals must therefore spur the organization into action. Let's look at several ways you can enlist help from inside and outside your organization.
Get executive management involved
Nothing gets a project moving faster than the CEO or CFO's buy-in. The key to obtaining their support is to help them understand the importance of security policies and policy enforcement. Policies provide boundaries for employee behavior, guidance on how the IT organization configures the infrastructure to protect the organization's assets, guidance on how the organization should safeguard mission-critical data and how the organization will react in the event of a security incident or disaster. Not only must executive management agree to support the policy initiative, they must also be willing to adhere to the policies themselves. When executive management abides by the rules, other employees will follow. Remind executive management that the current legislative environment is holding them responsible for corporate misdeeds and that a great way to prevent these misdeeds is by having strong policies that are consistently enforced.
Get the Board of Directors involved
Corporate Boards are now being held accountable for not providing adequate corporate governance and oversight, particularly when it comes to SOX. As with executive management, education is the key to getting the support of the Board. You should provide the Board with regular updates on security policy initiatives and enforcement, and regulatory developments.
Get your auditors involved
Talk to the organization's external auditors and seek their guidance with security policy development. Policies and
Get the organization involved
Create a steering committee of people from around the organization to help with security policies. The committee should consist of representatives from information technology, human resources, executive management, finance, internal audit and risk. To be most effective, recruit members who have decision-making roles in the organization. If you have buy-in from executive management, committee membership will not be optional! The committee should meet regularly to discuss policies and policy enforcement. Instead of dictating the policies, involve the committee in the whole process, creating and implementing the policies from the beginning. Once the committee members understand the need for policies, they can be your biggest proponents, advocating on your behalf throughout the organization.
Utilize existing policy resources from reputable sources
Many security organizations have Web sites with excellent security policy resources. For example, SANS (www.sans.org) devotes a section of its Web site to policy-related issues and has sample templates. Many colleges and universities also post their security policies, which can be used for inspiration.
Talk to business peers
Remember that your organization is not the only one that has to create and implement security policies. Contact business peers, trade associations, or regional and national information security organizations. Get a dialog going and discuss what works, what doesn't work and what fails miserably. Don't be afraid to share.
Make sure all employees are trained on the security policies that pertain to their role in the organization. A policy that no one knows about cannot be enforced. Use appropriate training methods and materials for different departments within the organization. For example, the information technology group will need to know specific technical details about hardware policies like router configuration, whereas general office staff should be briefed on how often they are required to change passwords, the importance of locking their workstations, etc. Training should not be limited to the individual policies alone, however. Why are the policies important? How will the policies affect, and perhaps even benefit, the employees and the organization? Showing employees what they need to do and how they can make an impact on the security of the organization can help motivate them to abide by the policies and assist in policy enforcement.
Will following these tips help you achieve immediate, full buy-in for information security policies and procedures from all parties in an organization? Probably not. Following these tips will help ensure that you have a solid plan for implementing information security policies that achieves organization-wide approval and support. Utilizing these tips, it may be possible to draft an entire army to assist in the development, deployment and enforcement of information security policies within the organization.
About the author
Harris Weisman is information systems security manager at Chemung Canal Trust Company, a regional bank with 15 branches in upstate New York. He previously worked as a security consultant at several large accounting/consulting firms.