Click here to close now.


Linux Containers Authors: Anders Wallgren, XebiaLabs Blog, Pat Romanski, Elizabeth White, Liz McMillan

Related Topics: Linux Containers, Containers Expo Blog

Linux Containers: Article

Creating IT Security Policies

An uncompromised necessity in today's business

It's no secret to technical developers that security issues need to be taken into consideration when developing policies. However, the extent of those security issues can easily be overlooked by many organizations.

You may be familiar with blended threats, those that combine the most harmful characteristics of worms, viruses, Trojan horses, and malicious code to exploit existing computer and Internet vulnerabilities. The effects of blended threats are evident with a look back at the Slammer, SoBig, and Blaster worms. These fast-spreading worms disrupted network operations and services around the world and garnered much attention. In addition, they cost companies down time, productivity loss, and many dollars.

The speed and severity of blended threats are not the only things companies should be immediately concerned about - many new threats are lurking around the corner with even more malice and destruction. There are many theorized attacks such as Warhol, Flash, and zero-day threats. These types of threats can spread across the entire Internet community even quicker and can exploit vulnerabilities before they are even recognized. Because these threats will leave little, if any, time to respond, the reactive security measures of the past are no longer sufficient. While they exist only in theory, these threats are driving public and private institutions to feel a greater sense of urgency regarding information security. Add to the increased availability of progressively sophisticated hacker tools for exploiting security vulnerabilities, and the drawbacks of reactive security become clear. Companies now must be proactive in regard to security measures. In addition, IT security and creating IT security policies need to be on the forefront of company agendas.

While most organizations profess to have some type of information security policy, many do not have official policies, in writing, for workers to follow. Having specific written policies in place and making all workers aware of the policies is crucial. These policies must also be taken seriously and enforced by the organization. However, all policies must relate directly to the specific business needs of the organization, so a detailed assessment and approach to creating these policies is important.

One of the most significant issues companies face is the need to comply with industry standards and government regulations for secure business. Industry guides such as the International Standards Organization (ISO) 17799 and government regulations such as the Gramm-Leach-Bliley Act (GLBA), the Health Insurance Portability and Accountability Act (HIPAA), and the Sarbanes-Oxley Act help provide a framework for improved corporate governance and controls. Accurately written and enforced, information security policies enable organizations to not only demonstrate their adherence to these critical regulations and standards but also to articulate their own requirements for mitigating risk.

Creating a Security Policy Task Force

The first step to creating security policies is to identify a task force. A typical security policy task force for a larger enterprise might include a member of senior management, IT directors, an information security expert, auditors, a human resources representative, legal counsel, and a public relations manager. The creation of a task force is extremely important; without it, the information security policy is weakened and less likely to be taken seriously by employees.

Each member of the task force will provide a unique contribution to the team. Garnering the support of a security professional helps ensure that the policy reflects relevant threats and recommended steps to mitigate risk. Input from auditors helps pinpoint the current type of computer-related activities within the company, and human resources personnel can provide direction pertaining to implementation, education, training, and enforcement. Involvement of legal counsel is important to ensure that the information security policy protects company assets, does not violate employees' rights, and addresses applicable laws and regulations. The public relations manager can help set up a communications plan for dealing with the media and keeping stakeholders informed as the company responds to security incidents. Once it is written, the security policy should be signed at the highest corporate level possible to demonstrate the corporation's commitment to information security.

Risk Assessment

Risk assessment is the next step in the process. Risk assessment is the challenging process of weighing security versus exposure. Similar to a business impact analysis, risk assessment pinpoints whether information is underprotected, overprotected, or adequately protected. When assessing which problems would create the most damage, businesses must keep in mind the following variables for each piece of data housed on their networks:
  • What resources are organizations interested in protecting?
  • What is the value of those resources, monetary or otherwise?
  • What possible threats do those resources face?
  • What is the likelihood of those threats being realized?
  • What would be the impact of those threats on the business, employees, or customers, if those threats were realized?
When determining the value of an asset, organizations must consider both its monetary value and its intrinsic value. Monetary value can be determined by considering what would happen if the asset were unavailable for any reason. While many businesses place value on monetary worth, the individual assessing the risk also must place value on intrinsic value. Intrinsic value is the loss of data, loss of privacy, legal liability, unwanted media exposure, loss of customer or investor confidence, and the costs associated with repairing security breaches. Once information assets are identified and valued, threats to those assets must be evaluated through risk assessment.

Although types of sensitive data can be quite broad and can vary from organization to organization, there are a few key types of information that every business should plan to protect. These include all data related to strategic plans, business operations, and financial data. Damage to or loss of any of this information can result in decreased sales, reduced competitive advantage, and decreased profits for the victimized company.

A Security Suite

What is traditionally referred to as a corporate information security policy is actually a suite of documents, including the actual security policy as well as a standards document and a procedures document. The security policy is the smallest of the three; in many cases, a good security policy might be a short two-page document.

While the actual security policy is brief, it is critically important. It touches on four key elements: to whom and what the policy applies, the need for adherence, a general description, and consequences of nonadherence. These key elements provide the framework for the remaining documents. Once the security policy document is complete, it must also be approved and signed by the most senior manager in the organization, then made available to all employees.

The next document in the security policy suite defines what needs to be done to implement security. An information security standards document also describes which security controls are required and which controls apply to each element in the environment.

A typical document set of this sort addresses a variety of security issues, from roles and responsibilities of security personnel to protection against malicious code, information and software exchange, user responsibilities, mobile computing, access control, and more. Standards documents also often detail such issues as systems security requirements, the security of applications and files, and security in development and support processes. In addition, compliance issues - whether legal requirements, security or technical reviews, or audits -are also outlined in a standards document as are government regulations and industry standards. The good news is that like the security policy the information security standards is usually created once; from then on, the document is changed only if new systems, applications, or regulations are introduced.

The information security procedures document is the final component of the corporate information security policy suite and is the largest and most frequently altered document in the suite. This is the last word in the corporation's information security plan and spells out how security controls must be implemented and managed. Procedures are mapped to standards, and complying with any given standard typically requires that many procedures or tasks be completed. With this document, accuracy can make the difference between a solid and enforceable policy and one that is easily dismissed and not followed.

Protection and Uptime

While the effort to create a security policy, standards, and procedures documents is substantial, the rewards can also be significant. Enforcing and measuring compliance is a serious and important step for a growing number of companies. Government legislation continues to call for increased security checks and balances across the entire corporate environment, so enforcement and protection of these efforts is crucial.

Making it easier for organizations to meet their compliance goals, automation tools are available that discover and report on vulnerabilities, then deliver concise and prioritized information to security administrators. With these tools, corporations can focus on resolving security issues, protecting critical assets, and ensuring business continuity within organizations.


It is understandable that the complexity of today's digital environment calls for security strategies to manage business risks while proactively protecting corporate assets and making sure employees comply. While Internet threats accelerate and become increasingly sophisticated and effective, organizations must strengthen their security posture through intelligent security management that is up-to-date and that incorporates new vulnerabilities. A strong security policy that is strictly enforced will provide the foundation for a secure business environment - an uncompromised business necessity.

More Stories By Ronald van Geijn

Ronald van Geijn is director of product marketing at Symantec, where he leverages nearly a decade of IT and security expertise to develop the company's marketing strategy for the vulnerability assessment, policy compliance product lines, as well as the Symantec Security Management System.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@ThingsExpo Stories
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
In his session at @ThingsExpo, Tony Shan, Chief Architect at CTS, will explore the synergy of Big Data and IoT. First he will take a closer look at the Internet of Things and Big Data individually, in terms of what, which, why, where, when, who, how and how much. Then he will explore the relationship between IoT and Big Data. Specifically, he will drill down to how the 4Vs aspects intersect with IoT: Volume, Variety, Velocity and Value. In turn, Tony will analyze how the key components of IoT influence Big Data: Device, Connectivity, Context, and Intelligence. He will dive deep to the matrix...
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT’s direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Building actually breathes - immediately flagging overheating in a closet or over cooling in unoccupied ho...
Scott Guthrie's keynote presentation "Journey to the intelligent cloud" is a must view video. This is from AzureCon 2015, September 29, 2015 I have reproduced some screen shots in case you are unable to view this long video for one reason or another. One of the highlights is 3 datacenters coming on line in India.
“The Internet of Things transforms the way organizations leverage machine data and gain insights from it,” noted Splunk’s CTO Snehal Antani, as Splunk announced accelerated momentum in Industrial Data and the IoT. The trend is driven by Splunk’s continued investment in its products and partner ecosystem as well as the creativity of customers and the flexibility to deploy Splunk IoT solutions as software, cloud services or in a hybrid environment. Customers are using Splunk® solutions to collect and correlate data from control systems, sensors, mobile devices and IT systems for a variety of Ind...
SYS-CON Events announced today that ProfitBricks, the provider of painless cloud infrastructure, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the cloud and the best price/performance value available. ProfitBricks was named one of the coolest Clo...
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud without worrying about any lock-in fears. In fact by having standard APIs for IaaS would help PaaS expl...
Organizations already struggle with the simple collection of data resulting from the proliferation of IoT, lacking the right infrastructure to manage it. They can't only rely on the cloud to collect and utilize this data because many applications still require dedicated infrastructure for security, redundancy, performance, etc. In his session at 17th Cloud Expo, Emil Sayegh, CEO of Codero Hosting, will discuss how in order to resolve the inherent issues, companies need to combine dedicated and cloud solutions through hybrid hosting – a sustainable solution for the data required to manage I...
Mobile messaging has been a popular communication channel for more than 20 years. Finnish engineer Matti Makkonen invented the idea for SMS (Short Message Service) in 1984, making his vision a reality on December 3, 1992 by sending the first message ("Happy Christmas") from a PC to a cell phone. Since then, the technology has evolved immensely, from both a technology standpoint, and in our everyday uses for it. Originally used for person-to-person (P2P) communication, i.e., Sally sends a text message to Betty – mobile messaging now offers tremendous value to businesses for customer and empl...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Bradley Holt, Developer Advocate at IBM Cloud Data Services, will demonstrate techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user experience, both offline and online. The focus of this talk will be on IBM Cloudant, Apa...
As more and more data is generated from a variety of connected devices, the need to get insights from this data and predict future behavior and trends is increasingly essential for businesses. Real-time stream processing is needed in a variety of different industries such as Manufacturing, Oil and Gas, Automobile, Finance, Online Retail, Smart Grids, and Healthcare. Azure Stream Analytics is a fully managed distributed stream computation service that provides low latency, scalable processing of streaming data in the cloud with an enterprise grade SLA. It features built-in integration with Azur...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
The enterprise is being consumerized, and the consumer is being enterprised. Moore's Law does not matter anymore, the future belongs to business virtualization powered by invisible service architecture, powered by hyperscale and hyperconvergence, and facilitated by vertical streaming and horizontal scaling and consolidation. Both buyers and sellers want instant results, and from paperwork to paperless to mindless is the ultimate goal for any seamless transaction. The sweetest sweet spot in innovation is automation. The most painful pain point for any business is the mismatch between supplies a...
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
As enterprises capture more and more data of all types – structured, semi-structured, and unstructured – data discovery requirements for business intelligence (BI), Big Data, and predictive analytics initiatives grow more complex. A company’s ability to become data-driven and compete on analytics depends on the speed with which it can provision their analytics applications with all relevant information. The task of finding data has traditionally resided with IT, but now organizations increasingly turn towards data source discovery tools to find the right data, in context, for business users, d...
SYS-CON Events announced today that MobiDev, a software development company, will exhibit at the 17th International Cloud Expo®, which will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software development company with representative offices in Atlanta (US), Sheffield (UK) and Würzburg (Germany); and development centers in Ukraine. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobile software company with over 150 developers, designers, quality assurance engineers, project manage...
Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities. In his session at @ThingsExpo, Michael Heydt, founder of Seamless Thingies, will discuss and demonstrate how devices and humans can be integrated from a simple clust...
SYS-CON Events announced today that Cloud Raxak has been named “Media & Session Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Raxak Protect automates security compliance across private and public clouds. Using the SaaS tool or managed service, developers can deploy cloud apps quickly, cost-effectively, and without error.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity. Should we federate, or not? How should identity be secured? Who owns the identity? How is identity ...