IT Policy Compliance and Compliance Technologies Maintaining compliance with laws and regulations in a complex IT environment is difficult. The vast

IT Policy Compliance and Compliance Technologies
Maintaining compliance with laws and regulations in a complex IT environment is difficult. The vast array of regulations a company must comply with is constantly increasing and changing. Each state has its own set of laws and regulations that indicate who is covered by thelaw & what event triggers consumer notifications. Laws which require notifying consumers of data breaches are a good example of conflicting rules.
1. Discuss the importance of collaboration and policy compliance across business areas
2. How can penetration testing be used to help ensure compliance?

Contents

Don't use plagiarized sources. Get Your Custom Assignment on
IT Policy Compliance and Compliance Technologies Maintaining compliance with laws and regulations in a complex IT environment is difficult. The vast
From as Little as $13/Page

Preface

Acknowledgments

PART ONE The Need for IT Security Policy Frameworks

CHAPTER 1 Information Systems Security Policy Management

What Is Information Systems Security?

Information Systems Security Management Life Cycle

What Is Information Assurance?

Confidentiality

Integrity

Nonrepudiation

What Is Governance?

Why Is Governance Important?

What Are Information Systems Security Policies?

Where Do Information Systems Security Policies Fit Within an Organization?

Why Information Systems Security Policies Are Important

Policies That Support Operational Success

Challenges of Running a Business Without Policies

Dangers of Not Implementing Policies

Dangers of Implementing the Wrong Policies

When Do You Need Information Systems Security Policies?

Business Process Reengineering (BPR)

Continuous Improvement

Making Changes in Response to Problems

Why Enforcing and Winning Acceptance for Policies Is Challenging

CHAPTER SUMMARY

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_21

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_20

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_19

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_18

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_17

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_16

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_15

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_14

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_13

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_12

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_11

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_10

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_9

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_8

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_7

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_6

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_5

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_4

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_3

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_2

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_1

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/08_part1.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/07_ack.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/06_pre.xhtml

KEY CONCEPTS AND TERMS

CHAPTER 1 ASSESSMENT

CHAPTER 2 Business Drivers for Information Security Policies

Why Are Business Drivers Important?

Maintaining Compliance

Compliance Requires Proper Security Controls

Security Controls Must Include Information Security Policies

Relationship Between Security Controls and Information Security Policy

Mitigating Risk Exposure

Educate Employees and Drive Security Awareness

Prevent Loss of Intellectual Property

Protect Digital Assets

Secure Privacy of Data

Lower Risk Exposure

Minimizing Liability of the Organization

Separation Between Employer and Employee

Acceptable Use Policies

Confidentiality Agreement and Nondisclosure Agreement

Business Liability Insurance Policies

Implementing Policies to Drive Operational Consistency

Forcing Repeatable Business Processes Across the Entire Organization

Differences Between Mitigating and Compensating Controls

Policies Help Prevent Operational Deviation

CHAPTER SUMMARY

KEY CONCEPTS AND TERMS

CHAPTER 2 ASSESSMENT

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_46

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_45

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_44

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_43

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_42

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_41

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_40

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_39

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_38

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_37

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_36

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_35

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_34

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_33

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_32

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_31

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_30

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_29

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_28

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_27

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_26

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_25

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_24

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_23

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_22

ENDNOTES

CHAPTER 3 U.S. Compliance Laws and Information Security Policy Requirements

U.S. Compliance Laws

What Are U.S. Compliance Laws?

Why Did U.S. Compliance Laws Come About?

Whom Do the Laws Protect?

Which Laws Require Proper Security Controls to Be Included in Policies?

Which Laws Require Proper Security Controls for Handling Privacy Data?

Aligning Security Policies and Controls with Regulations

Industry Leading Practices and Self-Regulation

Some Important Industry Standards

Payment Card Industry Data Security Standard (PCI DSS)

Statement on Standards for Attestation Engagements No. 16 (SSAE16)

Information Technology Infrastructure Library (ITIL)

CHAPTER SUMMARY

KEY CONCEPTS AND TERMS

CHAPTER 3 ASSESSMENT

ENDNOTES

CHAPTER 4 Business Challenges Within the Seven Domains of IT Responsibility

The Seven Domains of a Typical IT Infrastructure

User Domain

Workstation Domain

LAN Domain

LAN-to-WAN Domain

WAN Domain

Remote Access Domain

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_69

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_68

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_67

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_66

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_65

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_64

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_63

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_62

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_61

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_60

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_59

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_58

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_57

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_56a

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_56

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_55

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_54

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_53

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_52

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_51

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_50

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_49

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_48

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_47

System/Application Domain

Information Security Business Challenges and Security Policies That Mitigate Risk Within the Seven
Domains

User Domain

Workstation Domain

LAN Domain

LAN-to-WAN Domain

WAN Domain

Remote Access Domain

System/Application Domain

CHAPTER SUMMARY

KEY CONCEPTS AND TERMS

CHAPTER 4 ASSESSMENT

CHAPTER 5 Information Security Policy Implementation Issues

Human Nature in the Workplace

Basic Elements of Motivation

Personality Types of Employees

Leadership, Values, and Ethics

Organizational Structure

Flat Organizations

Hierarchical Organizations

The Challenge of User Apathy

The Importance of Executive Management Support

Selling Information Security Policies to an Executive

Before, During, and After Policy Implementation

The Role of Human Resources Policies

Relationship Between HR and Security Policies

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_93

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_92

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_91

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_90

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_89

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_88

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_87

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_86

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_85

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_84

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_83

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_82

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_81

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_80

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_79

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_78

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_77

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_76

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_75

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_74a

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_74

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_73

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_72

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_71

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_71

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_70

Lack of Support

Policy Roles, Responsibilities, and Accountability

Change Model

Responsibilities During Change

Roles and Accountabilities

When Policy Fulfillment Is Not Part of Job Descriptions

Impact on Entrepreneurial Productivity and Efficiency

Applying Security Policies to an Entrepreneurial Business

Tying Security Policy to Performance and Accountability

CHAPTER SUMMARY

KEY CONCEPTS AND TERMS

CHAPTER 5 ASSESSMENT

ENDNOTE

PART TWO Types of Policies and Appropriate Frameworks

CHAPTER 6 IT Security Policy Frameworks

What Is an IT Policy Framework?

What Is a Program Framework Policy or Charter?

Industry-Standard Policy Frameworks

What Is a Policy?

What Are Standards?

What Are Procedures?

What Are Guidelines?

Business Considerations for the Framework

Roles for Policy and Standards Development and Compliance

Information Assurance Considerations

Confidentiality

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_117

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_116

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_115

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_114

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_113

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_112

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_111

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_110

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_109

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_108

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_107

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/14_part2.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_106

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_105

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_104

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_103

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_102

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_101

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_100

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_99

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_98

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_97

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_96

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_95

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_94

Integrity

Availability

Information Systems Security Considerations

Unauthorized Access to and Use of the System

Unauthorized Disclosure of the Information

Disruption of the System or Services

Modification of Information

Destruction of Information Resources

Best Practices for IT Security Policy Framework Creation

Case Studies in Policy Framework Development

Private Sector Case Study

Public Sector Case Study

Private Sector Case Study

CHAPTER SUMMARY

KEY CONCEPTS AND TERMS

CHAPTER 6 ASSESSMENT

CHAPTER 7 How to Design, Organize, Implement, and Maintain IT Security Policies

Policies and Standards Design Considerations

Architecture Operating Model

Principles for Policy and Standards Development

The Importance of Transparency with Regard to Customer Data

Types of Controls for Policies and Standards

Document Organization Considerations

Sample Templates

Considerations for Implementing Policies and Standards

Building Consensus on Intent

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_141

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_140

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_139

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_138

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_137

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_136a

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_136

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_135

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_134

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_133

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_132

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_131

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_130

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_129

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_128

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_127

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_126

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_125

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_124

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_123

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_122

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_121

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_120

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_119

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_118

Reviews and Approvals

Publishing Your Policies and Standards Library

Awareness and Training

Policy Change Control Board

Business Drivers for Policy and Standards Changes

Maintaining Your Policies and Standards Library

Updates and Revisions

Best Practices for Policies and Standards Maintenance

Case Studies and Examples of Designing, Organizing, Implementing, and Maintaining IT Security Policies

Private Sector Case Study

Public Sector Case Study

CHAPTER SUMMARY

KEY CONCEPTS AND TERMS

CHAPTER 7 ASSESSMENT

CHAPTER 8 IT Security Policy Framework Approaches

IT Security Policy Framework Approaches

Risk Management and Compliance Approach

The Physical Domains of IT Responsibility Approach

Roles, Responsibilities, and Accountability for Personnel

The Seven Domains of a Typical IT Infrastructure

Organizational Structure

Organizational Culture

Separation of Duties

Layered Security Approach

Domain of Responsibility and Accountability

Governance and Compliance

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_166

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_165

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_164

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_163

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_162

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_161

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_160

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_159

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_158

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_157

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_156

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_155

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_154

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_153

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_152

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_151

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_150

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_149

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_148

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_147

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_146

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_145

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_144

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_143

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_142

IT Security Controls

IT Security Policy Framework

Best Practices for IT Security Policy Framework Approaches

What Is the Difference Between GRC and ERM?

Case Studies and Examples of IT Security Policy Framework Approaches

Private Sector Case Study

Public Sector Case Study

Critical Infrastructure Case Study

CHAPTER SUMMARY

KEY CONCEPTS AND TERMS

CHAPTER 8 ASSESSMENT

ENDNOTE

CHAPTER 9 User Domain Policies

The Weakest Link in the Information Security Chain

Social Engineering

Human Mistakes

Insiders

Seven Types of Users

Employees

Systems Administrators

Security Personnel

Contractors

Vendors

Guests and General Public

Control Partners

Contingent

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_190

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_189

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_188

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_187

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_186

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_185

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_184

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_183

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_182

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_181

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_180

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_180a

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_179

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_178

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_177

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_176

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_175

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_174

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_173

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_172

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_171

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_170

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_169

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_168

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_167

System

Why Govern Users with Policies?

Acceptable Use Policy (AUP)

The Privileged-Level Access Agreement (PAA)

Security Awareness Policy (SAP)

Best Practices for User Domain Policies

Understanding Least Access Privileges and Best Fit Privileges

Case Studies and Examples of User Domain Policies

Government Laptop Compromised

The Collapse of Barings Bank, 1995

Unauthorized Access to Defense Department Systems

CHAPTER SUMMARY

KEY CONCEPTS AND TERMS

CHAPTER 9 ASSESSMENT

CHAPTER 10 IT Infrastructure Security Policies

Anatomy of an Infrastructure Policy

Format of a Standard

Workstation Domain Policies

LAN Domain Policies

LAN-to-WAN Domain Policies

WAN Domain Policies

Remote Access Domain Policies

System/Application Domain Policies

Telecommunications Policies

Best Practices for IT Infrastructure Security Policies

Case Studies and Examples of IT Infrastructure Security Policies

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_215

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_214

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_213

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_212

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_211

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_210

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_209

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_208

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_207

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_206

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_205

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_204

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_203

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_202

https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_201

https://www.safaribooksonline.com/libra