-
Personnel Security Policies
-
Mandatory Vacations
- An organization requires that employees take a certain number of days of vacation consecutively, helping to detect potential malicious activity such as fraud or embezzlement.
-
Job Rotation
- More than one person is required to complete a particular task. This distributes control over a system, infrastructure, or particular task.
- Job rotation is one of the checks and balances that might be employed to enforce the proper separation of duties.
-
Separation of Duties
- More than one person is required to complete a particular task or operation.
-
Clean Desk Policy
- All documents, electronics, personally owned devices, and other items be put away (or locked away) when the user is not at his or her desk, or other work area.
-
Role-Based Awareness Training
- Data Owner
- Systems Administrator
- System Owner
- User
- Privileged User
- Executive User
-
Non-Disclosure Agreement (NDA)
- When signing this agreement, the signatory accepts and acknowledges specific rules of conduct, behavior, and/or nondisclosure of sensitive or privileged information.
-
Onboarding and Offboarding
-
Onboarding:
- when a new employee is added to an organization, and to its identity and access management system.
- Incorporates training, formal meetings, lectures, and human resources employee handbooks and videos.
- It can also be implemented when a person changes roles within an organization.
- Ultimately provides better job performance and higher job satisfaction.
-
Offboarding (Termination Policies):
- Exit Interviews
- Data Storage
- Account Termination
-
User Education and Awareness Training
- Training meant to educate employees about their responsibilities within the organization regarding security, as well as programs meant to remind employees of training already learned.
-
Acceptable Use Policy (AUP)
- A policy that defines the rules that restrict how a computer, network, or other system may be used.
-
Change Management
- A structured way of changing the state of a computer system, network, or IT procedure.
-
Due Diligence
- Ensuring that IT infrastructure risks are known and managed.
-
Due Care
- The mitigation action that an organization takes to defend against the risks that have been uncovered during due diligence.
-
Due Process
- The principle that an organization must respect and safeguard personnel's rights. This is to protect the employee from the state and from frivolous lawsuits.
-
General Security Policies
-
Social Media Networks, Applications, and Personal Email
-
Data Loss Prevention
- Social Engineering Threats
- Malware
- Acceptable Use Policies and NDA Breach