1.7 SECURITY POLICY

 Before making security policies for a system, first you should analyse how the data is important for you. After knowing the values of your data, you need to develop a set of policies to prevent it. These types of policies are called security policies and may apply to users, department and an organization. The policies are categorized in three different areas listed below:

  • · User Policies
  • · IT Policies
  • · General Policies

User Policies

Under these policies they cover issues related to the users. They define term related to users, what can users do with data or network. It has defined some terms which limit the users to keep the network secure such as access permission, restriction on programs etc. some policies are:

Password Policies: This policy is used to prevent an unauthorized access on user account. It defines procedure for users must change their password often, complexity rule and other items.

Internet Usage: Use of internet, mail, program with password or unencrypted data sent over internet.

System use: They put limitations on the users to use system limited by giving a limited permission on program installation, file sharing, instant messaging etc. 

IT Policies

These policies include general policy for the IT department. Some policies are:

Backup policy: They define policy for what to back up, who back it up, storage, testing etc.

Firewall Policy: They define which port to allow traffic or which blocked.

Client update policy: They define policies to update client.

General Policies

High level program policy: defines how owns other policies, scope, related document and purpose of policies. It covers:

Business continuity policy: in this category, it includes following plan:

  • · Crisis management
  • · Disaster management
  • · Server recovery
  • · Data recovery

Comments

Popular posts from this blog

3.8 SECURE NETWORK DEVICES

3.5 SECURITY ISSUES FOR SMALL AND MEDIUM SIZED BUSINESSES

3.4 TOPOLOGIES