22.12.2012 Views

Front cover - IBM Redbooks

Front cover - IBM Redbooks

Front cover - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

passwords and will comply with the security policy since its contents will be<br />

understood and the reason for complying will make sense. The trained user will<br />

understand that the policy in place doesn't seek to reduce the user's ability to<br />

work and perform his or her duties, but that it reduces the risk of security<br />

incidents which could definitively prevent the user from perform his or her duties<br />

and could quite likely prevent the company from working properly, if at all.<br />

The training phase is divided into two distinct steps: training the trainer and<br />

training the users. Training the trainer is the first step, of course, because you<br />

have to ensure that someone can explain things to the users. Since the security<br />

infrastructure will be unique for each organization, a custom training curriculum<br />

needs to be designed for the trainer, which explains to that person: the security<br />

infrastructure, the tools used to secure the infrastructure, the scope and<br />

limitations of the tools and of the overall security infrastructure and, perhaps<br />

more importantly, how the trainer should explain everything to the users.<br />

Training the users should then be straightforward, although the trainer will have to<br />

ensure that some of the basics are explained, such as what are threats, what are<br />

attacks (such as social engineering), what the policies and procedures are, and<br />

why it's important to comply with them. If done properly, the training will ensure<br />

that the users are happy with the new security infrastructure and will know<br />

enough to help keep the environment secure – as opposed to being at the top of<br />

the security risk list.<br />

9. Compliance testing<br />

Compliance can be defined as a willingness to abide by rules or regulations. In<br />

order to ensure compliance, the security policy should be enforced, very much<br />

like business rules are enforced. The security policy should also outline, insofar<br />

as compliance testing is concerned, how the rules will be applied, and finally, it<br />

should also outline the measures to be applied to ensure compliance.<br />

Compliance testing will certainly reveal some situations where there is a failure to<br />

comply. In such an event, the security policy should detail the measures that will<br />

be taken to deal with compliance failure, such as the severity of the sanctions,<br />

steps that need to be followed in order to re-establish compliance. Finally, the<br />

policy should provide a feedback mechanism to prevent reoccurrence.<br />

10. Results feedback<br />

Since security is a process and just not a product, it must be understood that it is<br />

based on technology, processes and people; that it evolves over time with the<br />

business; that it also evolves over time with the technology and that, finally, it<br />

evolves over time with changing risks and threats. Thus, as mentioned at the<br />

beginning, it has to be cyclical in nature.<br />

Chapter 2. Security methodologies 93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!