22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.5.3 Phase 2: Build<br />

4. Categorize the information<br />

Not all information needs to be secured in the same manner. Public information<br />

doesn't need to be secured, while “top secret” information (whose disclosure to<br />

unauthorized parties could result in the death of the business, or worse, the<br />

death of people) needs the utmost security and attention. Most information falls<br />

somewhere between these two extremes. Determining where each piece of<br />

information should be classified within these extremes, and what security to<br />

apply to each category of information, is done in this phase.<br />

5. Define policies and procedures<br />

This is where the security policy is crafted for the business. The security policy<br />

contains all the organization policies and procedures in matters of security.<br />

In most organizations, if there is a security policy, it is generally crafted from<br />

existing, non-IT policies and procedures that were defined for the business, then<br />

overlaid with information about the IT infrastructure and its security tools and<br />

work. This piecemeal approach explains why the security at these organizations<br />

is lacking.<br />

In the ISSL methodology, security policy is based on the work that was<br />

conducted in the previous steps. If the previous steps were not done properly,<br />

the security policy will definitively be lacking. Even if the previous steps were<br />

done properly and attention was paid to details, additional questions need to be<br />

asked at this step, namely: What systems are <strong>cover</strong>ed and who will be affected?<br />

How will security be implemented and maintained? What will be secured, how,<br />

and with what tools? Who will be trained to ensure secure behaviors?<br />

As well, the security policy should have the full support and full endorsement of<br />

the highest executive in the organization. The security policy should detail who is<br />

responsible for security within the organization, with roles and responsibilities<br />

being defined from the top down, starting with the organization's executives, then<br />

to the security manager, then to the owners of the different processes in the<br />

organization, then to the developers, engineers, and administrators of the IT<br />

infrastructure, all the way down to the individual users, who generally, in matters<br />

of security, are the chief troublemakers.<br />

The activities in this phase involve the actual implementation of the security<br />

infrastructure. All of the studying, evaluation, and classifying has been done. The<br />

security policy has been built and ratified by management. It's now time for<br />

action. The following steps make up the build phase.<br />

Chapter 2. Security methodologies 91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!