All documents in a policy and standards library are meant for people to read, understand, and implement. Policies and standards are not guidelines that offer suggestions. They are a collection of concrete definitions, procedures, and standards that describe acceptable and unacceptable human behavior. There are consequences for failing to follow approved standards. Developing them is not a trivial undertaking.
Most often, the questions related to where, when, and how are more appropriate for procedures or guidelines rather than policies or standards. Try to keep your policies and standards at the what, who, and why level of detail.
There’s little point in writing documents that people cannot understand or that make compliance highly difficult or impossible. The best kinds of documents are clearly worded and address the six key questions of who, what, where, when, why, and how. These questions provide a consistent direction in writing policies and standards. Journalists traditionally ask these six questions as they research and write news stories. Most readers, of news articles and policy documents alike, are busy. They need concise and precise information. Lack of clarity forces readers to make assumptions. Often those assumptions are wrong. When you answer these questions within the first few sections of your documents, you increase the reader’s comfort level and increase the likelihood of compliance.
When writing policies and standards, avoid using terms like should when you mean must or need to.
Effective policies are those that employees understand and embrace. It’s simply human nature for people to work harder for something they believe in. This depends on a shared belief system. These shared beliefs are collectively described as the organizational culture. Some organizations have a strong command and control culture. This dictates that policies and standards are written as strong, imperative statements; for example, “You must log off at the end of each workday.” Other organizations use subtler phrases and tone, intended to persuade those who must follow the policy. But it’s important to avoid using vague language or loose terms when developing your documents. This includes any terms that are vague. If the employees cannot understand clearly what is intended by the policies, they cannot comply. If you allow people to interpret your requirements on their own, they might look for ways to opt out of them.
The challenge is how to establish, or recognize, a core set of beliefs that can influence how you write policies. One method is to break the problem down into how the security controls are to be implemented and what controls are needed.
An operating model can help you understand how the security controls are to be implemented. One issue over which disagreement often arises is how much security should be centralized or decentralized within the business. A discussion of the operating model within the company can identify areas of disagreement and create a common set of beliefs on the proper placement and implementation of controls.
There are different ways to have this broad operational concept conversation. One way is outlined in a book entitled Enterprise Architecture as Strategy: Creating a Foundation for Business Execution, by Jeanne W. Ross, Peter Weill, and David C. Robertson. Their approach was to analyze and categorize the primary operating model of the business on the basis of four concepts: diversified, coordinated, replicated, and unified. As you can see by FIGURE 7-1, these operating model concepts are aligned with how the business chooses to integrate and standardize with an enterprise solution. In general, the higher the level of integration and standardization in an enterprise solution, the easier it is to implement security policies. The more the leaders of the business are deploying their own solution, the harder it is to implement security policies. The following defines each quadrant of Figure 7-1 in the context of IT solutions:
FIGURE 7-1 The four basic business operating models.
These are not mutually exclusive. You can certainly have a coordinated model that is also replicated. Typically, you will have both highly integrated and less integrated systems across the enterprise. These choices are made by the business and reflect the beliefs the business holds. For example, if a business makes several changes to an application over a year, it may want more direct control over the technology. The staff may see control as critical to their success. This is especially true if they feel they must make technological changes throughout the year to keep up with the market. This approach can lead to standalone solutions that are business-specific and less integrated with enterprise solutions.
The four concepts align with service integration and service standardization. Service integration generally refers to how much shared data is used across a business. Service standardization, on the other hand, refers to how much control the business has in setting up its solutions and processes. For example, a real estate business may have a high degree of service integration. The company may share data on new home purchases between the business unit that sold the home and the unit that sells insurance for the home.
Those four models are not the only ways of looking at a business; however, they are useful and clear models. They are a good starting point for considering your organization’s business model and how it impacts security policies. The operating model can have a profound effect on how your controls are implemented and how policies are written. The challenge is balancing the needs of the business and the enterprise needs to control security. These deliberate choices the business makes typically reflect the beliefs of the business’s leaders.
No two organizations or risk assessment outcomes are the same; there are no universal recipes for building an IT security program. Instead, principles help you make decisions in new situations using proven experience and industry best practices. By considering several principles, you can derive control requirements and help make implementation decisions.
Use the following principles to help you develop policies, standards, baselines, procedures, and guidelines. These are the common core security principles recommended for industry best practices, regardless of the organization’s business nature:
It is important not to underestimate the strong feelings the business has in the level of controls it wants over technology. The challenge is selecting an operating model that the business can commit to and that will ensure that IT security policies are enforced.
In addition to these principles, there are some specific steps that should be taken when developing security policies:
Policies related to the handling and use of customer data should include the concept of transparency. Organizations should be transparent and should notify individuals of the collection, use, dissemination, and maintenance of personally identifiable information (PII). PII is information that can be used to identify a specific person. This can be something used alone, such as a person’s name.
A closely related concept is nonpublic personal information (NPI). This is the term the Gramm-Leach-Bliley Act uses to refer to any personally identifiable financial information that a consumer provides to a financial institution.
Whenever customer data is involved, be sure to check with your compliance team on the legal requirements related to handling and use of such data.
Transparency with regard to handling of customer data should include the following elements:
With a shared sense of purpose and beliefs within the business and principles in hand, you can begin to map what you want to accomplish with the security controls. Security controls are measures taken to protect systems from attacks on the confidentiality, integrity, and availability (C-I-A triangle or triad) of the system. Sometimes, safeguards and countermeasures are used synonymously with the word control. Controls are chosen after the risk assessment of the assets is complete. Once you have identified and assessed the risks to your assets, you can select the appropriate control to counter the threat, mitigate it, or reduce the risks.
Security controls can be described according to two different categorization schemes: one based upon what the control is and the other based upon what the control does.
The first category includes administrative, technical, and physical control categories. They describe what the control actually is, such as a named process, a standard, a firewall, or a locked door:
To be effective, security must consider all three approaches. For example, if you wish to secure a server, it should be in a locked server room (physical controls). It should have strong authentication and an encrypted hard drive (technical controls). Finally, there must be effective security policies governing the server (administrative controls).
The second set of controls describes what controls do. These controls include the following:
There is significant overlap between security control categories. Some controls can be administrative and preventive or technical and corrective, or any combination. This overlap occurs by design for the purpose of implementing the principle of defense in depth.
You can find catalogs of security controls for virtually every security topic. For example, Control Objectives for Information and related Technology (COBIT) is an IT governance framework developed by ISACA that includes supporting tools to help bridge the gaps between control requirements, technical issues, and business risks. You can visit the ISACA website at http://www.isaca.org for more information.