This Security Policy document is aimed to define the security requirements for the proper and secure use of the Information Technology services in the Organization. Its goal is to protect the Organization and users to the maximum extent possible against security threats that could jeopardize their integrity, privacy, reputation, and business outcomes.
This document applies to all the users in the Organization, including temporary users, visitors with temporary access to services and partners with limited or unlimited access time to services. Compliance with policies in this document is mandatory for this constituency.
Roles | Responsibilities |
---|---|
Chief Information Officer |
|
Information Security Officer |
|
Information Owners |
|
IT Security Team |
|
Users |
|
The IT Assets Policy section defines the requirements for the proper and secure handling of all the IT assets in the Organization.
The policy applies to desktops, laptops, printers, and other equipment, to applications and software, to anyone using those assets including internal users, temporary workers, and visitors, and in general to any resource and capabilities involved in the provision of the IT services.
The Access Control Policy section defines the requirements for the proper and secure control of access to IT services and infrastructure in the Organization.
This policy applies to all the users in the organization, including temporary users, visitors with temporary access to services and partners with limited or unlimited access time to services.
The Password Control Policy section defines the requirements for the proper and secure handling of passwords in the Organization.
This policy applies to all the users in the Organization, including temporary users, visitors with temporary access to services and partners with limited or unlimited access time to services.
The Email Policy section defines the requirements for the proper and secure use of electronic mail in the Organization.
This policy applies to all the users in the Organization, including temporary users, visitors with temporary access to services and partners with limited or unlimited access time to services.
The Internet Policy section defines the requirements for the proper and secure access to Internet.
This policy applies to all the users in the Organization, including temporary users, visitors with temporary access to services and partners with limited or unlimited access time to services.
The Antivirus Policy section defines the requirements for the proper implementation of antivirus and other forms of protection in the Organization.
This policy applies to servers, workstations, and equipment in the Organization, including portable devices like laptops and PDA that may travel outside of the Organization facilities. Some policies apply to external computers and devices accessing the resources of the Organization.
The Information Classification Policy section defines a framework for the classification of the information according to its importance and risks involved. It is aimed at ensuring the appropriate integrity, confidentiality, and availability of the Organization information.
This policy applies to all the information created, owned, or managed by the Organization, including those stored in electronic or magnetic forms and those printed in paper.
The Remote Access Policy section defines the requirements for the secure remote access to the Organization’s internal resources.
This policy applies to the users and devices that need access the Organization’s internal resources from remote locations.
The Outsourcing Policy section defines the requirements needed to minimize the risks associated with the outsourcing of IT services, functions, and processes.
This policy applies to the Organization; the services providers to whom IT services, functions or processes are being outsourced, and the outsourcing process itself.
Term | Definition |
---|---|
Access Management | The process responsible for allowing users to make use of IT services, data or other assets. |
Asset | Any resource or capability. The assets of a service provider include anything that could contribute to the delivery of a service. |
Audit | Formal inspection and verification to check whether a standard or set of guidelines is being followed, that records are accurate, or that efficiency and effectiveness targets are being met. |
Confidentiality | A security principle that requires that data should only be accessed by authorized people. |
External Service Provider | An IT service provider that is part of a different organization from its customer. |
Identity | A unique name that is used to identify a user, person or role. |
Information Security Policy | The policy that governs the organization’s approach to information security management. |
Outsourcing | Using an external service provider to manage IT services. |
Policy | Formally documented management expectations and intentions. Policies are used to direct decisions, and to ensure consistent and appropriate development and implementation of processes, standards, roles, activities, IT infrastructure etc. |
Risk | A possible event that could cause harm or loss, or affect the ability to achieve objectives. |
Service Level | Measured and reported achievement against one or more service level targets. |
Warranty | Assurance that a product or service will meet agreed requirements. |