19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

satisfied through adherence to the technical organisational framework<br />

conditions.<br />

<strong>The</strong> results of such considerations should be specified in the <strong>Information</strong><br />

Security Policy.<br />

4. Content of the <strong>Information</strong> Security Policy<br />

<strong>The</strong> <strong>Information</strong> Security Policy should contain the following information<br />

as a minimum:<br />

- importance of <strong>IT</strong> security and <strong>IT</strong> to the accomplishment of work,<br />

- security objectives and the security strategy for the <strong>IT</strong> used.<br />

- assurance that the impetus for implementation of the <strong>Information</strong><br />

Security Policy comes from Management,<br />

- description of the organisational structure established for<br />

implementation of the <strong>IT</strong> security process (see S 2.193<br />

Establishment of a suitable organisational structure for <strong>IT</strong> security).<br />

It may also include statements on the following:<br />

- classification of information, access control, control of access to<br />

information and security of information processing systems;<br />

- assignment of responsibilities in the <strong>IT</strong> security process, notably to<br />

the <strong>IT</strong> Security Management Team, the <strong>IT</strong> Security Officer, the <strong>IT</strong><br />

users and <strong>IT</strong> administrators;<br />

- account of how the <strong>Information</strong> Security Policy is enforced,<br />

including procedures for dealing with security breaches and the<br />

disciplinary consequences of such breaches;<br />

- overview of documentation of the <strong>IT</strong> security process;<br />

- statements regarding periodic reviews of the <strong>IT</strong> security measures;<br />

- statements regarding programmes to promote <strong>IT</strong> security through<br />

training courses and measures intended to raise awareness of<br />

security issues.<br />

<strong>The</strong> <strong>Information</strong> Security Policy should be written in a concise style. It<br />

should be examined at regular intervals to ensure that it is still up-to-date,<br />

and be amended as necessary. It may be appropriate to document these<br />

cycles in the policy document.<br />

5. Distribution of the <strong>Information</strong> Security Policy<br />

It is important that Management presses home its objectives and<br />

expectations by having the <strong>Information</strong> Security Policy distributed, and<br />

that it stresses the value and importance of <strong>IT</strong> security in the organisation<br />

as a whole.<br />

As Management has ultimate responsibility for the <strong>Information</strong> Security<br />

Policy, the policy should be set down in writing. <strong>The</strong> document must have<br />

been formally approved by Management.<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Updating

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!