Page 102 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 102

individuals. Instead of assigning tasks and responsibilities to a

                  person, the policy should define tasks and responsibilities to fit a
                  role. That role is a function of administrative control or personnel
                  management. Thus, a security policy does not define who is to do
                  what but rather defines what must be done by the various roles
                  within the security infrastructure. Then these defined security roles
                  are assigned to individuals as a job description or an assigned work
                  task.







                  Acceptable Use Policy


                  An acceptable use policy is a commonly produced document that
                  exists as part of the overall security documentation infrastructure.

                  The acceptable use policy is specifically designed to assign security
                  roles within the organization as well as ensure the responsibilities
                  tied to those roles. This policy defines a level of acceptable
                  performance and expectation of behavior and activity. Failure to
                  comply with the policy may result in job action warnings, penalties,
                  or termination.




               Security Standards, Baselines, and Guidelines


               Once the main security policies are set, then the remaining security
               documentation can be crafted under the guidance of those policies.
               Standards define compulsory requirements for the homogenous use of
               hardware, software, technology, and security controls. They provide a
               course of action by which technology and procedures are uniformly
               implemented throughout an organization. Standards are tactical
               documents that define steps or methods to accomplish the goals and

               overall direction defined by security policies.

               At the next level are baselines. A baseline defines a minimum level of
               security that every system throughout the organization must meet. All
               systems not complying with the baseline should be taken out of
               production until they can be brought up to the baseline. The baseline
   97   98   99   100   101   102   103   104   105   106   107