Welcome!

Linux Containers Authors: Liz McMillan, Derek Weeks, Pat Romanski, Mano Marks, Elizabeth White

Related Topics: Linux Containers, Containers Expo Blog

Linux Containers: Article

Creating IT Security Policies

An uncompromised necessity in today's business

It's no secret to technical developers that security issues need to be taken into consideration when developing policies. However, the extent of those security issues can easily be overlooked by many organizations.

You may be familiar with blended threats, those that combine the most harmful characteristics of worms, viruses, Trojan horses, and malicious code to exploit existing computer and Internet vulnerabilities. The effects of blended threats are evident with a look back at the Slammer, SoBig, and Blaster worms. These fast-spreading worms disrupted network operations and services around the world and garnered much attention. In addition, they cost companies down time, productivity loss, and many dollars.

The speed and severity of blended threats are not the only things companies should be immediately concerned about - many new threats are lurking around the corner with even more malice and destruction. There are many theorized attacks such as Warhol, Flash, and zero-day threats. These types of threats can spread across the entire Internet community even quicker and can exploit vulnerabilities before they are even recognized. Because these threats will leave little, if any, time to respond, the reactive security measures of the past are no longer sufficient. While they exist only in theory, these threats are driving public and private institutions to feel a greater sense of urgency regarding information security. Add to the increased availability of progressively sophisticated hacker tools for exploiting security vulnerabilities, and the drawbacks of reactive security become clear. Companies now must be proactive in regard to security measures. In addition, IT security and creating IT security policies need to be on the forefront of company agendas.

While most organizations profess to have some type of information security policy, many do not have official policies, in writing, for workers to follow. Having specific written policies in place and making all workers aware of the policies is crucial. These policies must also be taken seriously and enforced by the organization. However, all policies must relate directly to the specific business needs of the organization, so a detailed assessment and approach to creating these policies is important.

One of the most significant issues companies face is the need to comply with industry standards and government regulations for secure business. Industry guides such as the International Standards Organization (ISO) 17799 and government regulations such as the Gramm-Leach-Bliley Act (GLBA), the Health Insurance Portability and Accountability Act (HIPAA), and the Sarbanes-Oxley Act help provide a framework for improved corporate governance and controls. Accurately written and enforced, information security policies enable organizations to not only demonstrate their adherence to these critical regulations and standards but also to articulate their own requirements for mitigating risk.

Creating a Security Policy Task Force

The first step to creating security policies is to identify a task force. A typical security policy task force for a larger enterprise might include a member of senior management, IT directors, an information security expert, auditors, a human resources representative, legal counsel, and a public relations manager. The creation of a task force is extremely important; without it, the information security policy is weakened and less likely to be taken seriously by employees.

Each member of the task force will provide a unique contribution to the team. Garnering the support of a security professional helps ensure that the policy reflects relevant threats and recommended steps to mitigate risk. Input from auditors helps pinpoint the current type of computer-related activities within the company, and human resources personnel can provide direction pertaining to implementation, education, training, and enforcement. Involvement of legal counsel is important to ensure that the information security policy protects company assets, does not violate employees' rights, and addresses applicable laws and regulations. The public relations manager can help set up a communications plan for dealing with the media and keeping stakeholders informed as the company responds to security incidents. Once it is written, the security policy should be signed at the highest corporate level possible to demonstrate the corporation's commitment to information security.

Risk Assessment

Risk assessment is the next step in the process. Risk assessment is the challenging process of weighing security versus exposure. Similar to a business impact analysis, risk assessment pinpoints whether information is underprotected, overprotected, or adequately protected. When assessing which problems would create the most damage, businesses must keep in mind the following variables for each piece of data housed on their networks:
  • What resources are organizations interested in protecting?
  • What is the value of those resources, monetary or otherwise?
  • What possible threats do those resources face?
  • What is the likelihood of those threats being realized?
  • What would be the impact of those threats on the business, employees, or customers, if those threats were realized?
When determining the value of an asset, organizations must consider both its monetary value and its intrinsic value. Monetary value can be determined by considering what would happen if the asset were unavailable for any reason. While many businesses place value on monetary worth, the individual assessing the risk also must place value on intrinsic value. Intrinsic value is the loss of data, loss of privacy, legal liability, unwanted media exposure, loss of customer or investor confidence, and the costs associated with repairing security breaches. Once information assets are identified and valued, threats to those assets must be evaluated through risk assessment.

Although types of sensitive data can be quite broad and can vary from organization to organization, there are a few key types of information that every business should plan to protect. These include all data related to strategic plans, business operations, and financial data. Damage to or loss of any of this information can result in decreased sales, reduced competitive advantage, and decreased profits for the victimized company.

A Security Suite

What is traditionally referred to as a corporate information security policy is actually a suite of documents, including the actual security policy as well as a standards document and a procedures document. The security policy is the smallest of the three; in many cases, a good security policy might be a short two-page document.

While the actual security policy is brief, it is critically important. It touches on four key elements: to whom and what the policy applies, the need for adherence, a general description, and consequences of nonadherence. These key elements provide the framework for the remaining documents. Once the security policy document is complete, it must also be approved and signed by the most senior manager in the organization, then made available to all employees.

The next document in the security policy suite defines what needs to be done to implement security. An information security standards document also describes which security controls are required and which controls apply to each element in the environment.

A typical document set of this sort addresses a variety of security issues, from roles and responsibilities of security personnel to protection against malicious code, information and software exchange, user responsibilities, mobile computing, access control, and more. Standards documents also often detail such issues as systems security requirements, the security of applications and files, and security in development and support processes. In addition, compliance issues - whether legal requirements, security or technical reviews, or audits -are also outlined in a standards document as are government regulations and industry standards. The good news is that like the security policy the information security standards is usually created once; from then on, the document is changed only if new systems, applications, or regulations are introduced.

The information security procedures document is the final component of the corporate information security policy suite and is the largest and most frequently altered document in the suite. This is the last word in the corporation's information security plan and spells out how security controls must be implemented and managed. Procedures are mapped to standards, and complying with any given standard typically requires that many procedures or tasks be completed. With this document, accuracy can make the difference between a solid and enforceable policy and one that is easily dismissed and not followed.

Protection and Uptime

While the effort to create a security policy, standards, and procedures documents is substantial, the rewards can also be significant. Enforcing and measuring compliance is a serious and important step for a growing number of companies. Government legislation continues to call for increased security checks and balances across the entire corporate environment, so enforcement and protection of these efforts is crucial.

Making it easier for organizations to meet their compliance goals, automation tools are available that discover and report on vulnerabilities, then deliver concise and prioritized information to security administrators. With these tools, corporations can focus on resolving security issues, protecting critical assets, and ensuring business continuity within organizations.

Conclusion

It is understandable that the complexity of today's digital environment calls for security strategies to manage business risks while proactively protecting corporate assets and making sure employees comply. While Internet threats accelerate and become increasingly sophisticated and effective, organizations must strengthen their security posture through intelligent security management that is up-to-date and that incorporates new vulnerabilities. A strong security policy that is strictly enforced will provide the foundation for a secure business environment - an uncompromised business necessity.

More Stories By Ronald van Geijn

Ronald van Geijn is director of product marketing at Symantec, where he leverages nearly a decade of IT and security expertise to develop the company's marketing strategy for the vulnerability assessment, policy compliance product lines, as well as the Symantec Security Management System.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Big Data engines are powering a lot of service businesses right now. Data is collected from users from wearable technologies, web behaviors, purchase behavior as well as several arbitrary data points we’d never think of. The demand for faster and bigger engines to crunch and serve up the data to services is growing exponentially. You see a LOT of correlation between “Cloud” and “Big Data” but on Big Data and “Hybrid,” where hybrid hosting is the sanest approach to the Big Data Infrastructure pro...
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
"LinearHub provides smart video conferencing, which is the Roundee service, and we archive all the video conferences and we also provide the transcript," stated Sunghyuk Kim, CEO of LinearHub, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Things are changing so quickly in IoT that it would take a wizard to predict which ecosystem will gain the most traction. In order for IoT to reach its potential, smart devices must be able to work together. Today, there are a slew of interoperability standards being promoted by big names to make this happen: HomeKit, Brillo and Alljoyn. In his session at @ThingsExpo, Adam Justice, vice president and general manager of Grid Connect, will review what happens when smart devices don’t work togethe...
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Discover top technologies and tools all under one roof at April 24–28, 2017, at the Westin San Diego in San Diego, CA. Explore the Mobile Dev + Test and IoT Dev + Test Expo and enjoy all of these unique opportunities: The latest solutions, technologies, and tools in mobile or IoT software development and testing. Meet one-on-one with representatives from some of today's most innovative organizations
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and E...
SYS-CON Events announced today that Linux Academy, the foremost online Linux and cloud training platform and community, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Linux Academy was founded on the belief that providing high-quality, in-depth training should be available at an affordable price. Industry leaders in quality training, provided services, and student certification passes, its goal is to c...
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.