Question

Attempting to make framework compliant policies is a difficult task for cybersecurity experts. However, it is...

Attempting to make framework compliant policies is a difficult task for cybersecurity experts. However, it is well known that implementing these policies is an even more difficult task, as it takes stakeholder buy-in and understanding in order for policies to be fully realized parts of the infrastructure. Knowing this, research and discuss implementation strategies that you would use in order to ensure that the security policies that have been set are being followed and that compliance levels remain well within the standards set forth in the framework.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Compliance is a crucial part of any framework or security system. The basic requirement to design a compliance framework is to obtain stated policies,standards,laws,regulations,etc. Usually compliance is changing in nature. The changing rules and regulations makes the job more challenging for an organisation to maintain a well implemented compliance framework. Another challenge is the continuous expansion and extension of production environments.

A well-designed cybersecurity policy narrates which system should be in place to guard critical data against attacks. It describes the concerned authorities how they will protect organisation's data and who will be responsible.

The framework have to include information on controls such as

a) Type of security programs to be implemented

b)Management and implementation of updates and patches which will reduce chaos

c)Data Backup

An organisation should define the security policy. Security documentation should include policies,standards,guidelines,procedures.

Security policies should include organisational/ master policy, system specific policy and Issue specific policy.

* Master policy is the blueprint about the security policy of whole organization

* System specific policy defines the features of a computer like hardware, software,procedures etc.

* Issue-specific policy defines functional aspects like email policy,media disposal policy, Vulnerability management policy etc.

Overall security policy does not specify a technological solution. It specifies sets of intentions and conditions which helps to protect assets along with organise business. Security policy design is not only the responsibility of IT team but is a responsibility of every one.

Policy should clearly identify roles and responsibilities which includes

1) Issuing of policy and maintenance responsibility

2)Enforcing the policy

3)Training of users on security awareness

4)When,Who and how responds to and revolves security incidents

5)Admin rights and controls

Important steps are

*identify critical assets

*Implement Process Mangement

*Self certify Compliance

*Task & Project Managemet

*Information protection

*Security Status monitoring

*Develop remedy and mitigation

Add a comment
Know the answer?
Add Answer to:
Attempting to make framework compliant policies is a difficult task for cybersecurity experts. However, it is...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Introduction: A manufacturing company that possesses many complexities can be highly challenged when maintaining production goals...

    Introduction: A manufacturing company that possesses many complexities can be highly challenged when maintaining production goals and standards in conjunction with a major organizational change. Garment manufacturing is a complex industry for many reasons. The product line is a complex array of styles, seasons, varying life cycles and multidimensional sizing. Many sewn product firms are viewing TQM as the appropriate strategy to meet the double demand of competition and quality; however, many companies are finding sustaining their TQM adoption decision...

  • what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics...

    what discuss can you make about medicalization and chronic disease and illness? Adult Lealth Nursing Ethics mie B. Butts OBJECTIVES After reading this chapter, the reader should be able to do the following: 1. Explore the concept of medicalization as it relates to the societal shift away from physician predominance of the 1970s. 2. Differentiate among the following terms: compliance, noncompliance, adherence, nonadherence, and concordance. 3. Examine cultural views with regard to self-determination, decision making, and American healthcare professionals' values...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Please help writing a well structured document using the below Agile Runbook - Our Overall Delivery Process How do we initiate a Project? Any project is a response to a pain point or desire expresse...

    Please help writing a well structured document using the below Agile Runbook - Our Overall Delivery Process How do we initiate a Project? Any project is a response to a pain point or desire expressed by either customers, internal stakeholders, employees, or regulatory authorities. In short, a project is a time bound and specific goal oriented task-system that is born out of an ask from any stakeholder. Project initiation is laying down a new project by defining its goals, objectives,...

  • I have this case study to solve. i want to ask which type of case study...

    I have this case study to solve. i want to ask which type of case study in this like problem, evaluation or decision? if its decision then what are the criterias and all? Stardust Petroleum Sendirian Berhad: how to inculcate the pro-active safety culture? Farzana Quoquab, Nomahaza Mahadi, Taram Satiraksa Wan Abdullah and Jihad Mohammad Coming together is a beginning; keeping together is progress; working together is success. - Henry Ford The beginning Stardust was established in 2013 as a...

  • Discussion questions 1. What is the link between internal marketing and service quality in the ai...

    Discussion questions 1. What is the link between internal marketing and service quality in the airline industry? 2. What internal marketing programmes could British Airways put into place to avoid further internal unrest? What potential is there to extend auch programmes to external partners? 3. What challenges may BA face in implementing an internal marketing programme to deliver value to its customers? (1981)ǐn the context ofbank marketing ths theme has bon pururd by other, nashri oriented towards the identification of...

  • How can we assess whether a project is a success or a failure? This case presents...

    How can we assess whether a project is a success or a failure? This case presents two phases of a large business transformation project involving the implementation of an ERP system with the aim of creating an integrated company. The case illustrates some of the challenges associated with integration. It also presents the obstacles facing companies that undertake projects involving large information technology projects. Bombardier and Its Environment Joseph-Armand Bombardier was 15 years old when he built his first snowmobile...

  • Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the...

    Q.3\ How could IT/e-banking assist an organization/ a bank to achieve a competitive advantage in the marketplace? Explain through the case of Citibank. please make sure you give a unique answer (not copied one) ,Please no hand writing, and need references. This question is from ECOM 421 e-Business Strategies and Business Models course e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet....

  • e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today...

    e-Business Strategy and Models in Banks : Case of Citibank E-business strategy in Citibank: Banks today are up-to-date with both the pros and cons of the internet. They are aware of the opportunities and threats that are associated with the Web. Not a single traditional bank is brave enough to face investment analysts without an Internet strategy. But even a very thoughtful approach to the Web may do no good to the company/ organization. The main purpose behind launching online...

  • Using the CNA Insurance company Knowledge Management scenario (below), carry out the following knowledge management assignment...

    Using the CNA Insurance company Knowledge Management scenario (below), carry out the following knowledge management assignment Questions after reading the scenario/essay: =============================================================================================================== For Gordon Larson, telling stories is all in a day's work at his job as chief knowledge officer at CNA, and that's just fine with executives at the Chicago-based insurance giant. Larson owes his job to a shift in corporate direction. Three years ago, under the direction of a new chairman, CNA set off on a new mission....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT