Page 338 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 338

types of privileges or access rights

                    Assists in the identification and assessment of the common
                    security controls where the information resides.







                             NIST SP 800-18 frequently uses the phrase “rules of

                  behavior,” which is effectively the same as an acceptable use policy
                  (AUP). Both outline the responsibilities and expected behavior of
                  individuals and state the consequences of not complying with the
                  rules or AUP. Additionally, individuals are required to periodically
                  acknowledge that they have read, understand, and agree to abide

                  by the rules or AUP. Many organizations post these on a website
                  and allow users to acknowledge that they understand and agree to
                  abide by them using an online electronic digital signature.




               Asset Owners

               The asset owner (or system owner) is the person who owns the asset or
               system that processes sensitive data. NIST SP 800-18 outlines the
               following responsibilities for the system owner:


                    Develops a system security plan in coordination with information
                    owners, the system administrator, and functional end users

                    Maintains the system security plan and ensures that the system is
                    deployed and operated according to the agreed-upon security
                    requirements

                    Ensures that system users and support personnel receive
                    appropriate security training, such as instruction on rules of

                    behavior (or an AUP)

                    Updates the system security plan whenever a significant change
                    occurs

                    Assists in the identification, implementation, and assessment of
                    the common security controls
   333   334   335   336   337   338   339   340   341   342   343