-
Most organizations have Employee Policies:
- Small companies may implement a code of ethics and an emergency response plan.
-
Larger organizations may choose to certify to a specific standard:
- ISO 9001
-
Privacy Policies
-
The Privacy Act of 1974 (US)
- Establishes a code of fair information practices that governs the collection, maintenance, use, and dissemination of information about individuals that is maintained in systems of records by federal agencies.
- Governs Personally Identifiable Information (PII) security standards.
-
Acceptable Use Policies (AUP)
- Policies that define the rules that restrict how a computer, network, or other system may be used.
- AUPs are often signed during the onboarding process, before the employee has been introduced to sensitive information.
- If a supervisor instructs an employee to perform a task that conflicts with the terms set forth in the signed AUP, the employee should know to refuse that supervisor.
-
Change Management
- A structured way of changing the state of a computer system, network, or IT procedure.
- Any change that a person wants to make must be introduced to each of the heads of various departments that it might affect.
- They must approve the change before it goes into effect.
- Before this happens, department managers will most likely make recommendations and/or give stipulations.
- When the necessary people have signed off on the change, it should be tested and then implemented.
- During implementation, it should be monitored and documented carefully.
-
Separation of Duties
- This is when more than one person is required to complete a particular task or operation.
- Distributes control over a system, infrastructure, or particular task.
-
Job Rotation
- Two or more employees switch roles at regular intervals, in order to increase user insight and skill level, and to decrease the risk of fraud and other illegal activities.
- One of the checks and balances that might be employed to enforce the proper separation of duties.
-
Mandatory Vacations
- When an organization requires that employees take a certain number of days of vacation consecutively, helping to detect potential malicious activity such as fraud or embezzlement.
-
Onboarding and Offboarding
-
Onboarding:
- When a new employee is added to an organization, and their identity is added to its access management system.
- Incorporates training, formal meetings, lectures, and human resources employee handbooks and videos.
- It can also be implemented when a person changes roles within an organization.
- Ultimately provides better job performance and higher job satisfaction.
-
Offboarding:
- Procedurally removing an employee from a federated identity management system, restricting rights and permissions, and possibly debriefing the person or conducting an exit interview.
- This happens when a person changes roles within an organization, or departs the organization altogether.
-
Due Diligence
- Ensuring that IT infrastructure risks are known and managed.
-
Due Care
- The mitigation actions that an organization takes to defend against the risks that have been uncovered during due diligence.
-
Due Process
- The principle that an organization must respect and safeguard personnel's rights.
- This is to protect the employee from the state and from frivolous lawsuits.
-
User Education and Awareness Training
-
Role-Based Training
-
Employees with different roles in the organization receive different types of training.
- HR
- Accounting
- Technical Roles
-
Account Training
- Password Policies
- Lockout Policies
-
Privacy Training
- HIPAA Training
- PII Training
- PCI DSS Training
-
Awareness Training
- Security reminders in emails, posters, banners, etc, to remind employees about secure practices.
-
Non-Disclosure Agreement (NDA):
- An agreement not to share (disclose) certain information.