Page 236 - CISSO_Prep_ Guide
P. 236

Information Security Risk Management

               Principles and Requirements
                   •  Requirements: functionality (what are the
                       features?) & assurance (how well does it
                       perform those features?)
                   •  Security blueprint: best practices that form a
                       comprehensive security policy program.  A
                       security architect figures out what the
                       security needs of an organization are and
                       creates a blueprint for the staff to follow.

               Policy - Terms
                   •  Standards: hardware & software to be
                       deployed universally across organizations.
                       Standards start with the phrase “We use…”
                       as in “We use Dell laptops” or “We use
                       Norton Antivirus.”
                   •  Procedures: step by step required actions.
                   •  Baseline: minimum security implementations
                       for specific platforms or environments.
                       Baselines measure minimums as in “All our
                       PCs have 1 GB RAM” or normal as in “Our e-
                       mail server sends 1,000 e-mails per hour.”
                   •  Guidelines: recommended actions, best
                       practices or suggestions
                          •  ISO 17799/27002
                                 •  Based on British Standard (BS)
                                     7799-1
   231   232   233   234   235   236   237   238   239   240   241