26. Common Security Policies

Security Policies and Regulatory Obligations

All policies must support the regulatory and contractual obligations of the organization.
Policies should cover required controls while remaining simple enough for users to understand. Senior management is responsible for the policies. Common security-related policies include the following.

Data Handling Policy

Defines how data can be used within the organization.

Example: Classifying credit card data as confidential helps ensure compliance with PCI DSS (Payment Card Industry Data Security Standard), which requires encryption of credit card information.

Password Policy

Defines expectations for systems and users regarding password use.

Acceptable Use Policy (AUP)

Defines acceptable use of the organization’s network and computer systems and helps protect the organization from legal action.

Employees or anyone with access to organizational assets should sign the AUP and keep a copy.

Common areas covered include:

Bring Your Own Device (BYOD) Policy

Allows employees to use personally owned devices for business purposes.

This approach can improve employee morale but creates security challenges because organizations lose some control over standardization and privacy.

Employees must agree to follow the policy before accessing organizational systems or data. Organizations must set clear expectations and business rules for BYOD devices.

Privacy Policy

Addresses protection of Personally identifiable information (PII) and electronic protected health information (ePHI).

The policy should specify:

Examples of related laws include GDPR, PIPEDA, HIPAA, and GLBA.

Organizations should also provide a public document explaining how private information is used internally and externally.

Change Management Policy

Change management governs how systems move from the current state to a future state. It includes:

Changes to systems, components, or operating environments may introduce vulnerabilities. A change management process ensures changes are implemented without negatively affecting business operations.


discord :