Implementing an Information Security Program

There are several strategies and tactics when developing and implementing information security policies throughout your organization. Many organizations today worry about having a policy set so they can check the box, rather than developing a set of policies that drive security practices through the company’s operations. Within this page we will discuss what I have found to be the best and most effective strategy to develop and implement security policies and practices.

Policy Development

Firstly, you must understand what regulations and requirements your organizations may be governed by? For example Health Care is governed by HIPAA, the financial industry is regulated by PCI DSS.  Once you have an understand of your organizations regulatory requirements you also need to take into account your company’s unique operating environment and understand on how it should be governed.

From here you are ready to start your skeleton policy set, now you must identify what Cyber Security Framework your organization is aligned too and decide if you are going to map to that framework, or if it differs map your policy set to the regulatory requirement your organization is likely to be audited against?

There is no right or wrong answer, in the event of an audit the auditor may require you to map your policy set to the specific regulatory requirements. As an example an organization may decide to align its Cyber Security Practices and operations to a NIST or HITRUST framework but for ease of auditing their policy set may be directly mapped to HIPAA.

Now you will follow the controls outlined in the framework you have selected and build out the skeleton policy set. This will ensure that you are meeting the control requirements defined by the framework you are aligning too. In most cases you will have several policies that are separate from this core set to meet your needs. This would include things like a Remote Access Policy, a Sanctions Policy or an Acceptable Use Policy in which you may want new hires or those that it effects ie. remote workers sign the policy acknowledging their understanding.

With the skeleton policy template in place now you can work through the categories and fill in the blanks outlining your “Though shall not” statements defining the security requirements for that control category.

*Note: Once a policy is implemented it does not mean the outlined requirements have to be in place today, but you do need to have a plan of action for bringing your organization into alignment with the policies which have been approved by the Senior Leadership.

IT Security SOP’s

Now it’s time to drive those requirements defined within your policy set into action across your organization. That is where creating security standard operation procedures comes into place. In most cases this will lead to developing unique security SOP’s for the varying business units – branches – departments across your organization. Developing security driven standard operating procedures at the department level allows you to account for that departments specific needs and use cases, and I know that sounds like an insurmountable task but lets break it down.

At the start of this project I often like to work with my clients to develop something I call a “Roles by Controls Matrix”, just select the hyperlink for a free download. In this you will again map back to the framework your organization is aligning too and account for any special requirements your business may have. List out the controls utilized across the organization as well as identify all of the key departments. At that point you just fill in the blanks identifying the security control and what departments have a hand in managing that control and to what level. This will give you a plan of action for which departments you want to tackle first and how many departments you are going to need to work with.

Developing departmental security standard operating procedures can take several trial and errors and hours of your precious time as you work out the kinks from your initial attempts. To help guide you in this process I have developed a template that will allow you to quickly move into taking action and driving security practices across your most critical business units. Run into a problem I am only a phone call away.

Information Security Program

Information Security Policies are the backbone to your security program

The ISP can serve as a core element in your organization’s cybersecurity program. It can stand alone or be paired with other specialized products we offer.

This product is an editable, easily implemented document that contains the policies, standards and guidelines that your company can use to establish a leading framework-based cybersecurity security program. Being Microsoft Word documentation, you have the ability to make edits, as you see fit!

Unlike some of our competition that sell “bronze, silver and gold” levels of documentation, we understand that a standard is a standard for a reason. We take out the guesswork associated with picking an appropriate package level – we focus on providing documentation that offers a straightforward solution to provide the appropriate coverage you need. This focus on providing the best solution for our clients makes us proud that we are providing the best set of IT security policies and standards available. Saving a few dollars on a cheap solution can easily leave you with a false sense of security and gaping holes in your documentation that can leave you liable.