SlideShare a Scribd company logo
1 of 3
Develop a 6- to 7-page manual using the
Security Standards, Policies, and Procedures Template
with recommendations to management of security standards,
polices, and procedures which should be implemented in your
chosen organization.
Research and include the following:
REFER TO ADDITIONAL RESOURCES BELOW and the
grading rubric.
Explain the importance to your organization of implementing
security policies, plans, and procedures. Discuss how security
policies, plans, and procedures will improve the overall security
of the organization.
Recommend appropriate policies and procedures for:
Data classification policies and procedures (data isolation)
Non-disclosure Agreement policies and procedures
Strong authentication (password policies and procedures... and
multi factor authentication)
Acceptable use of organizational assets and data
Employee policies (separation of duties/training)
Risk Management
Avoidance
Transference
Mitigation
Acceptance
Compliance examples that might affect your organization or
others [Regulatory, Advisory, Informative]
HIPAA
NIST Cybersecurity Framework
Sarbanes/Oxley
GLBA
PCI DSS
Incident response (How should we prepare, and what should
happen in each phase)
Preparation
Identification
Containment
Eradication
Recovery
Lessons learned (root cause analysis and action plan)
Auditing
Environmental/Physical
Administrative
From the text:
"Controls are implemented as administrative, logical, and
physical. Administrative controls are also known as
management controls and include policies and procedures.
Logical controls are also known as technical controls and are
implemented through technology. Physical controls use physical
means to protect objects."
Configuration (change management and system hardening)

More Related Content

Similar to Develop a 6- to 7-page manual using the Security Standards, Po.docx

1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
durantheseldine
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Tammy Clark
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
wacasr
 
Michael Charman, GIO presents at the OHS Leaders Summit 2013
Michael Charman, GIO presents at the OHS Leaders Summit 2013Michael Charman, GIO presents at the OHS Leaders Summit 2013
Michael Charman, GIO presents at the OHS Leaders Summit 2013
Media Corp International
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
William Godwin
 
A Risk Management Analyst identifies and analyzes potential issu.docx
A Risk Management Analyst identifies and analyzes potential issu.docxA Risk Management Analyst identifies and analyzes potential issu.docx
A Risk Management Analyst identifies and analyzes potential issu.docx
makdul
 

Similar to Develop a 6- to 7-page manual using the Security Standards, Po.docx (20)

Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) AssessmentConducting a NIST Cybersecurity Framework (CSF) Assessment
Conducting a NIST Cybersecurity Framework (CSF) Assessment
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed PinsentThe AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
The AIDA toolkit: Assessing Institutional Digital Assets, by Ed Pinsent
 
ISO 27701 Essentials: Building a Robust Privacy Management System
ISO 27701 Essentials: Building a Robust Privacy Management SystemISO 27701 Essentials: Building a Robust Privacy Management System
ISO 27701 Essentials: Building a Robust Privacy Management System
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Ch14 Policies and Legislation
Ch14 Policies and LegislationCh14 Policies and Legislation
Ch14 Policies and Legislation
 
Security policies
Security policiesSecurity policies
Security policies
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Michael Charman, GIO presents at the OHS Leaders Summit 2013
Michael Charman, GIO presents at the OHS Leaders Summit 2013Michael Charman, GIO presents at the OHS Leaders Summit 2013
Michael Charman, GIO presents at the OHS Leaders Summit 2013
 
Testing
TestingTesting
Testing
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Business case for information security program
Business case for information security programBusiness case for information security program
Business case for information security program
 
Business case for Information Security program
Business case for Information Security programBusiness case for Information Security program
Business case for Information Security program
 
ISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptxISO27001_COBIT_Students.pptx
ISO27001_COBIT_Students.pptx
 
isms-presentation.ppt
isms-presentation.pptisms-presentation.ppt
isms-presentation.ppt
 
A Risk Management Analyst identifies and analyzes potential issu.docx
A Risk Management Analyst identifies and analyzes potential issu.docxA Risk Management Analyst identifies and analyzes potential issu.docx
A Risk Management Analyst identifies and analyzes potential issu.docx
 

More from hcheryl1

Develop a research paper on the project charter process. Follow th.docx
Develop a research paper on the project charter process. Follow th.docxDevelop a research paper on the project charter process. Follow th.docx
Develop a research paper on the project charter process. Follow th.docx
hcheryl1
 
Develop a research paper on the project charter process. PAR.docx
Develop a research paper on the project charter process. PAR.docxDevelop a research paper on the project charter process. PAR.docx
Develop a research paper on the project charter process. PAR.docx
hcheryl1
 
Develop a water sustainability plan for your city, hometown, or ne.docx
Develop a water sustainability plan for your city, hometown, or ne.docxDevelop a water sustainability plan for your city, hometown, or ne.docx
Develop a water sustainability plan for your city, hometown, or ne.docx
hcheryl1
 
Developmental Review 32 (2012) 224–267Contents lists availab.docx
Developmental Review 32 (2012) 224–267Contents lists availab.docxDevelopmental Review 32 (2012) 224–267Contents lists availab.docx
Developmental Review 32 (2012) 224–267Contents lists availab.docx
hcheryl1
 
Developmental Review 32 (2012) 205–223Contents lists availab.docx
Developmental Review 32 (2012) 205–223Contents lists availab.docxDevelopmental Review 32 (2012) 205–223Contents lists availab.docx
Developmental Review 32 (2012) 205–223Contents lists availab.docx
hcheryl1
 
Developmental and Communication MilestonesOne of the first tas.docx
Developmental and Communication MilestonesOne of the first tas.docxDevelopmental and Communication MilestonesOne of the first tas.docx
Developmental and Communication MilestonesOne of the first tas.docx
hcheryl1
 
Developments New technology that affects policy process • So.docx
Developments New technology that affects policy process • So.docxDevelopments New technology that affects policy process • So.docx
Developments New technology that affects policy process • So.docx
hcheryl1
 
Developmental Stages Week 7Christina Sierra 1Sub.docx
Developmental Stages Week 7Christina Sierra 1Sub.docxDevelopmental Stages Week 7Christina Sierra 1Sub.docx
Developmental Stages Week 7Christina Sierra 1Sub.docx
hcheryl1
 
Developmental Science. 2018;21e12610. wileyonlinelibrary.com.docx
Developmental Science. 2018;21e12610. wileyonlinelibrary.com.docxDevelopmental Science. 2018;21e12610. wileyonlinelibrary.com.docx
Developmental Science. 2018;21e12610. wileyonlinelibrary.com.docx
hcheryl1
 

More from hcheryl1 (20)

Develop a synopsis of your outcomes for acquiring, developing, train.docx
Develop a synopsis of your outcomes for acquiring, developing, train.docxDevelop a synopsis of your outcomes for acquiring, developing, train.docx
Develop a synopsis of your outcomes for acquiring, developing, train.docx
 
Develop a strategic plan for the company that you selected at the .docx
Develop a strategic plan for the company that you selected at the .docxDevelop a strategic plan for the company that you selected at the .docx
Develop a strategic plan for the company that you selected at the .docx
 
develop a storyboard display. This will be a depiction of a QI proje.docx
develop a storyboard display. This will be a depiction of a QI proje.docxdevelop a storyboard display. This will be a depiction of a QI proje.docx
develop a storyboard display. This will be a depiction of a QI proje.docx
 
Develop a research paper on the project charter process. Follow th.docx
Develop a research paper on the project charter process. Follow th.docxDevelop a research paper on the project charter process. Follow th.docx
Develop a research paper on the project charter process. Follow th.docx
 
Develop a realistic case and Identify a chronic illness and its .docx
Develop a realistic case and Identify a chronic illness and its .docxDevelop a realistic case and Identify a chronic illness and its .docx
Develop a realistic case and Identify a chronic illness and its .docx
 
Develop a Scholarly written Research Document Report  topic Han.docx
Develop a Scholarly written Research Document Report  topic Han.docxDevelop a Scholarly written Research Document Report  topic Han.docx
Develop a Scholarly written Research Document Report  topic Han.docx
 
Develop a Risk Log (aka Risk Register), identifying ten (10) ris.docx
Develop a Risk Log (aka Risk Register), identifying ten (10) ris.docxDevelop a Risk Log (aka Risk Register), identifying ten (10) ris.docx
Develop a Risk Log (aka Risk Register), identifying ten (10) ris.docx
 
Develop a public relations plan. Make sure to read the chapter on Pr.docx
Develop a public relations plan. Make sure to read the chapter on Pr.docxDevelop a public relations plan. Make sure to read the chapter on Pr.docx
Develop a public relations plan. Make sure to read the chapter on Pr.docx
 
Develop a Resource Audit and a Value System for Tesco. For the.docx
Develop a Resource Audit and a Value System for Tesco. For the.docxDevelop a Resource Audit and a Value System for Tesco. For the.docx
Develop a Resource Audit and a Value System for Tesco. For the.docx
 
Develop a research paper on the project charter process. PAR.docx
Develop a research paper on the project charter process. PAR.docxDevelop a research paper on the project charter process. PAR.docx
Develop a research paper on the project charter process. PAR.docx
 
Develop a water sustainability plan for your city, hometown, or ne.docx
Develop a water sustainability plan for your city, hometown, or ne.docxDevelop a water sustainability plan for your city, hometown, or ne.docx
Develop a water sustainability plan for your city, hometown, or ne.docx
 
Develop an 8- to 12-slide Microsoft® PowerPoint® presentat.docx
Develop an 8- to 12-slide Microsoft® PowerPoint® presentat.docxDevelop an 8- to 12-slide Microsoft® PowerPoint® presentat.docx
Develop an 8- to 12-slide Microsoft® PowerPoint® presentat.docx
 
Developmental Review 32 (2012) 224–267Contents lists availab.docx
Developmental Review 32 (2012) 224–267Contents lists availab.docxDevelopmental Review 32 (2012) 224–267Contents lists availab.docx
Developmental Review 32 (2012) 224–267Contents lists availab.docx
 
Develop a plan to integrate this new data warehouse with an Intern.docx
Develop a plan to integrate this new data warehouse with an Intern.docxDevelop a plan to integrate this new data warehouse with an Intern.docx
Develop a plan to integrate this new data warehouse with an Intern.docx
 
Developmental Review 32 (2012) 205–223Contents lists availab.docx
Developmental Review 32 (2012) 205–223Contents lists availab.docxDevelopmental Review 32 (2012) 205–223Contents lists availab.docx
Developmental Review 32 (2012) 205–223Contents lists availab.docx
 
Developmental and Communication MilestonesOne of the first tas.docx
Developmental and Communication MilestonesOne of the first tas.docxDevelopmental and Communication MilestonesOne of the first tas.docx
Developmental and Communication MilestonesOne of the first tas.docx
 
Developments New technology that affects policy process • So.docx
Developments New technology that affects policy process • So.docxDevelopments New technology that affects policy process • So.docx
Developments New technology that affects policy process • So.docx
 
Developmental Stages Week 7Christina Sierra 1Sub.docx
Developmental Stages Week 7Christina Sierra 1Sub.docxDevelopmental Stages Week 7Christina Sierra 1Sub.docx
Developmental Stages Week 7Christina Sierra 1Sub.docx
 
Develop a presentation on the cultural identity with which you align.docx
Develop a presentation on the cultural identity with which you align.docxDevelop a presentation on the cultural identity with which you align.docx
Develop a presentation on the cultural identity with which you align.docx
 
Developmental Science. 2018;21e12610. wileyonlinelibrary.com.docx
Developmental Science. 2018;21e12610. wileyonlinelibrary.com.docxDevelopmental Science. 2018;21e12610. wileyonlinelibrary.com.docx
Developmental Science. 2018;21e12610. wileyonlinelibrary.com.docx
 

Recently uploaded

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 

Develop a 6- to 7-page manual using the Security Standards, Po.docx

  • 1. Develop a 6- to 7-page manual using the Security Standards, Policies, and Procedures Template with recommendations to management of security standards, polices, and procedures which should be implemented in your chosen organization. Research and include the following: REFER TO ADDITIONAL RESOURCES BELOW and the grading rubric. Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization. Recommend appropriate policies and procedures for: Data classification policies and procedures (data isolation) Non-disclosure Agreement policies and procedures Strong authentication (password policies and procedures... and multi factor authentication) Acceptable use of organizational assets and data Employee policies (separation of duties/training) Risk Management Avoidance
  • 2. Transference Mitigation Acceptance Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative] HIPAA NIST Cybersecurity Framework Sarbanes/Oxley GLBA PCI DSS Incident response (How should we prepare, and what should happen in each phase) Preparation Identification Containment Eradication Recovery Lessons learned (root cause analysis and action plan)
  • 3. Auditing Environmental/Physical Administrative From the text: "Controls are implemented as administrative, logical, and physical. Administrative controls are also known as management controls and include policies and procedures. Logical controls are also known as technical controls and are implemented through technology. Physical controls use physical means to protect objects." Configuration (change management and system hardening)