IT Policy Compliance and Compliance Technologies
Maintaining compliance with laws and regulations in a complex IT environment is difficult. The vast array of regulations a company must comply with is constantly increasing and changing. Each state has its own set of laws and regulations that indicate who is covered by thelaw & what event triggers consumer notifications. Laws which require notifying consumers of data breaches are a good example of conflicting rules.
1. Discuss the importance of collaboration and policy compliance across business areas
2. How can penetration testing be used to help ensure compliance?
Contents
Preface
Acknowledgments
PART ONE The Need for IT Security Policy Frameworks
CHAPTER 1 Information Systems Security Policy Management
What Is Information Systems Security?
Information Systems Security Management Life Cycle
What Is Information Assurance?
Confidentiality
Integrity
Nonrepudiation
What Is Governance?
Why Is Governance Important?
What Are Information Systems Security Policies?
Where Do Information Systems Security Policies Fit Within an Organization?
Why Information Systems Security Policies Are Important
Policies That Support Operational Success
Challenges of Running a Business Without Policies
Dangers of Not Implementing Policies
Dangers of Implementing the Wrong Policies
When Do You Need Information Systems Security Policies?
Business Process Reengineering (BPR)
Continuous Improvement
Making Changes in Response to Problems
Why Enforcing and Winning Acceptance for Policies Is Challenging
CHAPTER SUMMARY
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_21
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_20
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_19
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_18
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_17
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_16
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_15
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_14
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_13
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_12
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_11
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_10
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_9
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_8
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_7
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_6
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_5
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_4
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_3
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_2
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_1
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/08_part1.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/07_ack.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/06_pre.xhtml
KEY CONCEPTS AND TERMS
CHAPTER 1 ASSESSMENT
CHAPTER 2 Business Drivers for Information Security Policies
Why Are Business Drivers Important?
Maintaining Compliance
Compliance Requires Proper Security Controls
Security Controls Must Include Information Security Policies
Relationship Between Security Controls and Information Security Policy
Mitigating Risk Exposure
Educate Employees and Drive Security Awareness
Prevent Loss of Intellectual Property
Protect Digital Assets
Secure Privacy of Data
Lower Risk Exposure
Minimizing Liability of the Organization
Separation Between Employer and Employee
Acceptable Use Policies
Confidentiality Agreement and Nondisclosure Agreement
Business Liability Insurance Policies
Implementing Policies to Drive Operational Consistency
Forcing Repeatable Business Processes Across the Entire Organization
Differences Between Mitigating and Compensating Controls
Policies Help Prevent Operational Deviation
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 2 ASSESSMENT
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_46
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_45
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_44
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_43
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_42
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_41
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_40
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_39
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_38
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_37
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_36
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_35
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_34
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_33
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_32
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_31
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_30
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_29
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_28
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_27
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_26
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_25
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_24
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_23
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/09_ch1.xhtml#sec_22
ENDNOTES
CHAPTER 3 U.S. Compliance Laws and Information Security Policy Requirements
U.S. Compliance Laws
What Are U.S. Compliance Laws?
Why Did U.S. Compliance Laws Come About?
Whom Do the Laws Protect?
Which Laws Require Proper Security Controls to Be Included in Policies?
Which Laws Require Proper Security Controls for Handling Privacy Data?
Aligning Security Policies and Controls with Regulations
Industry Leading Practices and Self-Regulation
Some Important Industry Standards
Payment Card Industry Data Security Standard (PCI DSS)
Statement on Standards for Attestation Engagements No. 16 (SSAE16)
Information Technology Infrastructure Library (ITIL)
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 3 ASSESSMENT
ENDNOTES
CHAPTER 4 Business Challenges Within the Seven Domains of IT Responsibility
The Seven Domains of a Typical IT Infrastructure
User Domain
Workstation Domain
LAN Domain
LAN-to-WAN Domain
WAN Domain
Remote Access Domain
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_69
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_68
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_67
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_66
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_65
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_64
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_63
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_62
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_61
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_60
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_59
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_58
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_57
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_56a
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_56
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_55
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_54
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_53
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_52
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_51
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_50
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_49
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml#sec_48
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/11_ch3.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/10_ch2.xhtml#sec_47
System/Application Domain
Information Security Business Challenges and Security Policies That Mitigate Risk Within the Seven
Domains
User Domain
Workstation Domain
LAN Domain
LAN-to-WAN Domain
WAN Domain
Remote Access Domain
System/Application Domain
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 4 ASSESSMENT
CHAPTER 5 Information Security Policy Implementation Issues
Human Nature in the Workplace
Basic Elements of Motivation
Personality Types of Employees
Leadership, Values, and Ethics
Organizational Structure
Flat Organizations
Hierarchical Organizations
The Challenge of User Apathy
The Importance of Executive Management Support
Selling Information Security Policies to an Executive
Before, During, and After Policy Implementation
The Role of Human Resources Policies
Relationship Between HR and Security Policies
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_93
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_92
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_91
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_90
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_89
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_88
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_87
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_86
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_85
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_84
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_83
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_82
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_81
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_80
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_79
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_78
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_77
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_76
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_75
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_74a
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_74
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_73
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_72
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_71
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_71
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/12_ch4.xhtml#sec_70
Lack of Support
Policy Roles, Responsibilities, and Accountability
Change Model
Responsibilities During Change
Roles and Accountabilities
When Policy Fulfillment Is Not Part of Job Descriptions
Impact on Entrepreneurial Productivity and Efficiency
Applying Security Policies to an Entrepreneurial Business
Tying Security Policy to Performance and Accountability
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 5 ASSESSMENT
ENDNOTE
PART TWO Types of Policies and Appropriate Frameworks
CHAPTER 6 IT Security Policy Frameworks
What Is an IT Policy Framework?
What Is a Program Framework Policy or Charter?
Industry-Standard Policy Frameworks
What Is a Policy?
What Are Standards?
What Are Procedures?
What Are Guidelines?
Business Considerations for the Framework
Roles for Policy and Standards Development and Compliance
Information Assurance Considerations
Confidentiality
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_117
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_116
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_115
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_114
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_113
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_112
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_111
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_110
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_109
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_108
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_107
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/14_part2.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_106
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_105
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_104
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_103
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_102
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_101
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_100
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_99
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_98
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_97
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_96
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_95
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/13_ch5.xhtml#sec_94
Integrity
Availability
Information Systems Security Considerations
Unauthorized Access to and Use of the System
Unauthorized Disclosure of the Information
Disruption of the System or Services
Modification of Information
Destruction of Information Resources
Best Practices for IT Security Policy Framework Creation
Case Studies in Policy Framework Development
Private Sector Case Study
Public Sector Case Study
Private Sector Case Study
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 6 ASSESSMENT
CHAPTER 7 How to Design, Organize, Implement, and Maintain IT Security Policies
Policies and Standards Design Considerations
Architecture Operating Model
Principles for Policy and Standards Development
The Importance of Transparency with Regard to Customer Data
Types of Controls for Policies and Standards
Document Organization Considerations
Sample Templates
Considerations for Implementing Policies and Standards
Building Consensus on Intent
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_141
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_140
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_139
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_138
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_137
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_136a
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_136
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_135
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_134
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_133
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_132
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_131
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_130
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_129
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_128
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_127
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_126
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_125
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_124
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_123
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_122
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_121
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_120
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_119
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/15_ch6.xhtml#sec_118
Reviews and Approvals
Publishing Your Policies and Standards Library
Awareness and Training
Policy Change Control Board
Business Drivers for Policy and Standards Changes
Maintaining Your Policies and Standards Library
Updates and Revisions
Best Practices for Policies and Standards Maintenance
Case Studies and Examples of Designing, Organizing, Implementing, and Maintaining IT Security Policies
Private Sector Case Study
Public Sector Case Study
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 7 ASSESSMENT
CHAPTER 8 IT Security Policy Framework Approaches
IT Security Policy Framework Approaches
Risk Management and Compliance Approach
The Physical Domains of IT Responsibility Approach
Roles, Responsibilities, and Accountability for Personnel
The Seven Domains of a Typical IT Infrastructure
Organizational Structure
Organizational Culture
Separation of Duties
Layered Security Approach
Domain of Responsibility and Accountability
Governance and Compliance
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_166
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_165
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_164
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_163
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_162
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_161
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_160
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_159
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_158
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_157
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_156
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_155
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_154
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_153
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_152
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_151
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_150
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_149
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_148
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_147
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_146
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_145
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_144
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_143
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/16_ch7.xhtml#sec_142
IT Security Controls
IT Security Policy Framework
Best Practices for IT Security Policy Framework Approaches
What Is the Difference Between GRC and ERM?
Case Studies and Examples of IT Security Policy Framework Approaches
Private Sector Case Study
Public Sector Case Study
Critical Infrastructure Case Study
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 8 ASSESSMENT
ENDNOTE
CHAPTER 9 User Domain Policies
The Weakest Link in the Information Security Chain
Social Engineering
Human Mistakes
Insiders
Seven Types of Users
Employees
Systems Administrators
Security Personnel
Contractors
Vendors
Guests and General Public
Control Partners
Contingent
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_190
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_189
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_188
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_187
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_186
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_185
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_184
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_183
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_182
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_181
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_180
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_180a
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_179
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_178
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_177
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_176
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_175
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_174
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_173
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_172
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_171
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_170
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_169
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_168
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/17_ch8.xhtml#sec_167
System
Why Govern Users with Policies?
Acceptable Use Policy (AUP)
The Privileged-Level Access Agreement (PAA)
Security Awareness Policy (SAP)
Best Practices for User Domain Policies
Understanding Least Access Privileges and Best Fit Privileges
Case Studies and Examples of User Domain Policies
Government Laptop Compromised
The Collapse of Barings Bank, 1995
Unauthorized Access to Defense Department Systems
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 9 ASSESSMENT
CHAPTER 10 IT Infrastructure Security Policies
Anatomy of an Infrastructure Policy
Format of a Standard
Workstation Domain Policies
LAN Domain Policies
LAN-to-WAN Domain Policies
WAN Domain Policies
Remote Access Domain Policies
System/Application Domain Policies
Telecommunications Policies
Best Practices for IT Infrastructure Security Policies
Case Studies and Examples of IT Infrastructure Security Policies
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_215
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_214
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_213
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_212
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_211
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_210
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_209
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_208
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_207
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_206
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml#sec_205
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/19_ch10.xhtml
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_204
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_203
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_202
https://www.safaribooksonline.com/library/view/security-policies-and/9781284055993/18_ch9.xhtml#sec_201
https://www.safaribooksonline.com/libra