Before you start:
Attention should be focused when writing policies to make sure that they are effective and do not conflict. In order to make sure that your policies are effective, keep in mind the following secure design principles:
Mandatory Reading:
Read The Security Principles of Saltzer and Schroeder (link) blog for a greater understanding.
Project Overview
This project includes the following tasks:
A security policy is the document developed by an organization that formally states how it plans to protect its information and information systems. Organizations should treat a security policy as a “living document.” This means that the organization continuously reviews and updates the document as technology and employee requirements change.
Organizations use several documents to support its policy infrastructure. In this project, you will be developing the following documents:
An effective security policy references the standards and guidelines that exist within an organization. An information security policy contains high-level statements with the intent of protecting information and assets. It is the responsibility of senior management to develop security policies.
Standards are mandatory controls that enforce and support the information security policy. Standards are a collection of properties or rules that an organization formally adopts and recognizes. There are many standards organizations in the information technology field including IEEE, EIA/TIA, NIST and ISO.
Guidelines are recommended, non-mandatory controls that support standards and provide a foundation for the development of best practices.
Procedures are the systematic instructions used by employees within the organization that explain how to implement the controls defined in the policies, standards, and guidelines.
For example, a password policy states the standard for creating strong passwords and protecting passwords. A password construction guideline defines how to create a strong password and provides best practices recommendations. The password procedure provides the instructions on how to implement the strong password requirement. Organizations do not update policies as frequently as they update procedures within the information security policy framework.
ACME Healthcare is a healthcare company that runs over 25 medical facilities including patient care, diagnostics, outpatient care and emergency care. The organization has experienced several data breaches over the last five years. These data breaches have cost the organization financially and damaged its reputation.
The executive leadership team recently hired a new Chief Information Security Officer (CISO). The new CISO has brought in one of the top cybersecurity penetration teams to perform a full security audit on the entire organization. This independent contractor conducted the audit, and found the following vulnerabilities:
Example: SS IN FILES BELOW Labeled Example 1
RUBRIC:
Security audit findings
Find the top five starting with the greatest vulnerability.
Maximum score
8
Recommended Policies
Identify policies for top five vulnerabilities.
Maximum score
8
Policy Citations
Cite your policy for each vulnerability.
Maximum score
9
NOTE: Follow the template as a guideline. Address all existing policy elements in the template. No policy should exceed two pages in length.
You should be submitting two documents to get full credit!
RUBRIC:
Information Security Policy
Document is an Information Security Policy that contains all sections included in the SANS template, not a procedure or Guideline.
Maximum score
15
Information Security Procedure
Document is a step-by-step set of instructions that contains all of the information that a user would need to properly configure or complete the task (Procedure)
Maximum score
10
Research and document the information required to create an information security policy implementation and dissemination plan. (Use the Security Awareness Planning Toolkit above) Include specific tasks and events that ACME Healthcare will use to make sure that all employees involved are aware of the information security policies that pertain to them. The plan should include any specific departments that need to be involved. ACME Healthcare must also be able to assess whether individuals have the proper knowledge of the policies that pertain to their job responsibilities.
EXample: SS In Files Labeled Example 2
RUBRIC:
Tasks and Events
List at least ten tasks or events
Maximum score
10
List of departments that should be involved
List of departments that should be involved
Maximum score
10
Metrics
Method of assessing absorption of information by employees
Maximum score
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Custom Essay Writing Services for Students Worldwide is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order form
Once we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignment
As soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download