Welcome!

Linux Containers Authors: Yeshim Deniz, Liz McMillan, Ian Khan, Pat Romanski, Elizabeth White

Related Topics: Linux Containers, Containers Expo Blog

Linux Containers: Article

Creating IT Security Policies

An uncompromised necessity in today's business

It's no secret to technical developers that security issues need to be taken into consideration when developing policies. However, the extent of those security issues can easily be overlooked by many organizations.

You may be familiar with blended threats, those that combine the most harmful characteristics of worms, viruses, Trojan horses, and malicious code to exploit existing computer and Internet vulnerabilities. The effects of blended threats are evident with a look back at the Slammer, SoBig, and Blaster worms. These fast-spreading worms disrupted network operations and services around the world and garnered much attention. In addition, they cost companies down time, productivity loss, and many dollars.

The speed and severity of blended threats are not the only things companies should be immediately concerned about - many new threats are lurking around the corner with even more malice and destruction. There are many theorized attacks such as Warhol, Flash, and zero-day threats. These types of threats can spread across the entire Internet community even quicker and can exploit vulnerabilities before they are even recognized. Because these threats will leave little, if any, time to respond, the reactive security measures of the past are no longer sufficient. While they exist only in theory, these threats are driving public and private institutions to feel a greater sense of urgency regarding information security. Add to the increased availability of progressively sophisticated hacker tools for exploiting security vulnerabilities, and the drawbacks of reactive security become clear. Companies now must be proactive in regard to security measures. In addition, IT security and creating IT security policies need to be on the forefront of company agendas.

While most organizations profess to have some type of information security policy, many do not have official policies, in writing, for workers to follow. Having specific written policies in place and making all workers aware of the policies is crucial. These policies must also be taken seriously and enforced by the organization. However, all policies must relate directly to the specific business needs of the organization, so a detailed assessment and approach to creating these policies is important.

One of the most significant issues companies face is the need to comply with industry standards and government regulations for secure business. Industry guides such as the International Standards Organization (ISO) 17799 and government regulations such as the Gramm-Leach-Bliley Act (GLBA), the Health Insurance Portability and Accountability Act (HIPAA), and the Sarbanes-Oxley Act help provide a framework for improved corporate governance and controls. Accurately written and enforced, information security policies enable organizations to not only demonstrate their adherence to these critical regulations and standards but also to articulate their own requirements for mitigating risk.

Creating a Security Policy Task Force

The first step to creating security policies is to identify a task force. A typical security policy task force for a larger enterprise might include a member of senior management, IT directors, an information security expert, auditors, a human resources representative, legal counsel, and a public relations manager. The creation of a task force is extremely important; without it, the information security policy is weakened and less likely to be taken seriously by employees.

Each member of the task force will provide a unique contribution to the team. Garnering the support of a security professional helps ensure that the policy reflects relevant threats and recommended steps to mitigate risk. Input from auditors helps pinpoint the current type of computer-related activities within the company, and human resources personnel can provide direction pertaining to implementation, education, training, and enforcement. Involvement of legal counsel is important to ensure that the information security policy protects company assets, does not violate employees' rights, and addresses applicable laws and regulations. The public relations manager can help set up a communications plan for dealing with the media and keeping stakeholders informed as the company responds to security incidents. Once it is written, the security policy should be signed at the highest corporate level possible to demonstrate the corporation's commitment to information security.

Risk Assessment

Risk assessment is the next step in the process. Risk assessment is the challenging process of weighing security versus exposure. Similar to a business impact analysis, risk assessment pinpoints whether information is underprotected, overprotected, or adequately protected. When assessing which problems would create the most damage, businesses must keep in mind the following variables for each piece of data housed on their networks:
  • What resources are organizations interested in protecting?
  • What is the value of those resources, monetary or otherwise?
  • What possible threats do those resources face?
  • What is the likelihood of those threats being realized?
  • What would be the impact of those threats on the business, employees, or customers, if those threats were realized?
When determining the value of an asset, organizations must consider both its monetary value and its intrinsic value. Monetary value can be determined by considering what would happen if the asset were unavailable for any reason. While many businesses place value on monetary worth, the individual assessing the risk also must place value on intrinsic value. Intrinsic value is the loss of data, loss of privacy, legal liability, unwanted media exposure, loss of customer or investor confidence, and the costs associated with repairing security breaches. Once information assets are identified and valued, threats to those assets must be evaluated through risk assessment.

Although types of sensitive data can be quite broad and can vary from organization to organization, there are a few key types of information that every business should plan to protect. These include all data related to strategic plans, business operations, and financial data. Damage to or loss of any of this information can result in decreased sales, reduced competitive advantage, and decreased profits for the victimized company.

A Security Suite

What is traditionally referred to as a corporate information security policy is actually a suite of documents, including the actual security policy as well as a standards document and a procedures document. The security policy is the smallest of the three; in many cases, a good security policy might be a short two-page document.

While the actual security policy is brief, it is critically important. It touches on four key elements: to whom and what the policy applies, the need for adherence, a general description, and consequences of nonadherence. These key elements provide the framework for the remaining documents. Once the security policy document is complete, it must also be approved and signed by the most senior manager in the organization, then made available to all employees.

The next document in the security policy suite defines what needs to be done to implement security. An information security standards document also describes which security controls are required and which controls apply to each element in the environment.

A typical document set of this sort addresses a variety of security issues, from roles and responsibilities of security personnel to protection against malicious code, information and software exchange, user responsibilities, mobile computing, access control, and more. Standards documents also often detail such issues as systems security requirements, the security of applications and files, and security in development and support processes. In addition, compliance issues - whether legal requirements, security or technical reviews, or audits -are also outlined in a standards document as are government regulations and industry standards. The good news is that like the security policy the information security standards is usually created once; from then on, the document is changed only if new systems, applications, or regulations are introduced.

The information security procedures document is the final component of the corporate information security policy suite and is the largest and most frequently altered document in the suite. This is the last word in the corporation's information security plan and spells out how security controls must be implemented and managed. Procedures are mapped to standards, and complying with any given standard typically requires that many procedures or tasks be completed. With this document, accuracy can make the difference between a solid and enforceable policy and one that is easily dismissed and not followed.

Protection and Uptime

While the effort to create a security policy, standards, and procedures documents is substantial, the rewards can also be significant. Enforcing and measuring compliance is a serious and important step for a growing number of companies. Government legislation continues to call for increased security checks and balances across the entire corporate environment, so enforcement and protection of these efforts is crucial.

Making it easier for organizations to meet their compliance goals, automation tools are available that discover and report on vulnerabilities, then deliver concise and prioritized information to security administrators. With these tools, corporations can focus on resolving security issues, protecting critical assets, and ensuring business continuity within organizations.

Conclusion

It is understandable that the complexity of today's digital environment calls for security strategies to manage business risks while proactively protecting corporate assets and making sure employees comply. While Internet threats accelerate and become increasingly sophisticated and effective, organizations must strengthen their security posture through intelligent security management that is up-to-date and that incorporates new vulnerabilities. A strong security policy that is strictly enforced will provide the foundation for a secure business environment - an uncompromised business necessity.

More Stories By Ronald van Geijn

Ronald van Geijn is director of product marketing at Symantec, where he leverages nearly a decade of IT and security expertise to develop the company's marketing strategy for the vulnerability assessment, policy compliance product lines, as well as the Symantec Security Management System.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


@ThingsExpo Stories
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Adobe is changing the world though digital experiences. Adobe helps customers develop and deliver high-impact experiences that differentiate brands, build loyalty, and drive revenue across every screen, including smartphones, computers, tablets and TVs. Adobe content solutions are used daily by millions of companies worldwide-from publishers and broadcasters, to enterprises, marketing agencies and household-name brands. Building on its established design leadership, Adobe enables customers not o...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
WebRTC adoption has generated a wave of creative uses of communications and collaboration through websites, sales apps, customer care and business applications. As WebRTC has become more mainstream it has evolved to use cases beyond the original peer-to-peer case, which has led to a repeating requirement for interoperability with existing infrastructures. In his session at @ThingsExpo, Graham Holt, Executive Vice President of Daitan Group, will cover implementation examples that have enabled ea...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...