




版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
1、www.fastitilsecurity policycompany namecompany namestreet addresscity, state zip codecreation datenotes: the following template is provided for writing an information security policy document. inside each section, text in green font between brackets is included to provide guidance to the author and
2、should be deleted before publishing the final document. inside each section, text in black font is included to provide a realistic example. inside the example, text in underlined, blue font indicates a possible hyperlink to a report or document.you are free to edit and use this template and its cont
3、ents within your organization; however, we do ask that you dont distribute this template on the web without explicit permission from us.copyrights: itil is a registered trade mark of the office of government commerce in the united kingdom and other countries. www.fastitilsecurity policypage 2documen
4、t controlpreparationactionnamedatereleaseversiondate releasedchange noticepages affectedremarksdistribution listnameorganizationtitle www.fastitilsecurity policypage 3table of contents1.introduction.41.1purpose.41.2scope .41.3definitions, acronyms, and abbreviations.41.4references .61.5overview .62.
5、basic information.72.1business units.72.2categorization of services.72.3list of services.83.service template.94.service catalogue .114.1storage services .115.annex .145.1list of tables.14 www.fastitilsecurity policypage 41.introductionthe information security policy states the types and levels of se
6、curity over the information technology resources and capabilities that must be established and operated in order for those items to be considered secure. the information can be gathered in one or more documents.you can structure policies in as many sections as you identify as valid in your organizat
7、ion. in the example below, sections have been selected according from the recommendations in the itil guidance. you may include more sections as far as you detect more technologies in your company to be addressed with specific policies. sections have been written all together in one document. you ma
8、y as well separate them into independent policy documents for easier managing, e.g. one for email policies, other for internet policies and so on.1.1 purposespecify the intention of the entire security policy.this security policy document is aimed to define the security requirements for the proper a
9、nd secure use of the information technology services in the organization. its goal is to protect the organization and users to the maximum extent possible against security threats that could jeopardize their integrity, privacy, reputation and business outcomes.1.2 scopedefine here the scope where po
10、licies in the whole document apply.this document applies to all the users in the organization, including temporary users, visitors with temporary access to services and partners with limited or unlimited access time to services. compliance with policies in this document is mandatory for this constit
11、uency.1.3 historythis section of the security policy is aimed to check the life time of a specific version of the whole document. in case you separate into several policy documents, ensure there is a version history for each one of them. policies must be reviewed and eventually updated periodically
12、to keep up with changes in risks, technologies and regulations.versiondescriptionfromtoauthor1.0initial version8/1/20 xx7/1/20 xxjohn doe www.fastitilsecurity policypage 51.4 responsibilitiesidentify all the roles involved and their responsibilities in the enforcement of the policies in this documen
13、t.rolesresponsibilitieschief information officeraccountable for all aspects of the organizations information security.information security officerresponsible for the security of the it infrastructure.plan against security threats, vulnerabilities, and risks.implement and maintain security policy doc
14、uments.ensure security training programs.ensure it infrastructure supports security policies.respond to information security incidents.help in disaster recovery plans.information ownershelp with the security requirements for their specific area.determine the privileges and access rights to the resou
15、rces within their areas. it security teamimplements and operates it security.implements the privileges and access rights to the resources.supports security policies.usersmeet security policies.report any attempted security breaches. www.fastitilsecurity policypage 61.5 general policy definitionslist
16、 here all the security policies that are global to the whole document and not belonging to a specific section. formulate them in direct, understandable terms, avoiding language that can be too technical or to legal for the common user. avoid been too specific in procedures or too attached to technol
17、ogy. concentrate instead in formulating the policy itself. you may structure the policies inside this section in subcategories if you think it contributes to the clarity of the document.1.exceptions to the policies defined in any part of this document may only be authorized by the information securi
18、ty officer. in those cases, specific procedures may be put in place to handle request and authorization for exceptions. 2.every time a policy exception is invoked, an entry must be entered into a security log specifying the date and time, description, reason for the exception and how the risk was ma
19、naged.3.all the it services should be used in compliance with the technical and security requirements defined in the design of the services. 4.infractions of the policies in this document may lead to disciplinary actions. in some serious cases they could even led to prosecution. www.fastitilsecurity
20、 policypage 72.it assets policy this section of the security policy lists policies for the secure handling of the it assets.2.1 purpose specify what the intention of this policy section is.the it assets policy section defines the requirements for the proper and secure handling of all the it assets i
21、n the organization.2.2 scopewrite here whom this policy is aimed to. in doing so you are facilitating the distribution of policies to the target groups of users.the policy applies to desktops, laptops, printers and other equipment, to applications and software, to anyone using those assets including
22、 internal users, temporary workers and visitors, and in general to any resource and capabilities involved in the provision of the it services.2.3 policy definitionslist here all the it asset policies you have identified as necessary to regulate in your organization. formulate them in direct, underst
23、andable terms, avoiding language that can be too technical or to legal for the common user. avoid been too specific in procedures or too attached to technology. concentrate instead in formulating the policy itself. you may structure the policies inside this section in subcategories if you think it c
24、ontributes to the clarity of the security policy document.1.it assets must only be used in connection with the business activities they are assigned and / or authorized.2.all the it assets must be classified into one of the categories in the organizations security categories; according to the curren
25、t business function they are assigned to.3.every user is responsible for the preservation and correct use of the it assets they have been assigned.4.all the it assets must be in locations with security access restrictions, environmental conditions and layout according to the security classification
26、and technical specifications of the aforementioned assets. www.fastitilsecurity policypage 85.active desktop and laptops must be secured if left unattended. whenever possible, this policy should be automatically enforced.6.access to assets is forbidden for non-authorized personnel. granting access t
27、o the assets involved in the provision of a service must be done through the approved service request management and access management processes.7.all personnel interacting with the it assets must have the proper training.8.users shall maintain the assets assigned to them clean and free of accidents
28、 or improper use. they shall not drink or eat near the equipment.9.access to assets in the organization location must be restricted and properly authorized, including those accessing remotely. companys laptops, pdas and other equipment used at external location must be periodically checked and maint
29、ained.10. the it technical teams are the sole responsible for maintaining and upgrading configurations. none other users are authorized to change or upgrade the configuration of the it assets. that includes modifying hardware or installing software.11. special care must be taken for protecting lapto
30、ps, pdas and other portable assets from being stolen. be aware of extreme temperatures, magnetic fields and falls.12. when travelling by plane, portable equipment like laptops and pdas must remain in possession of the user as hand luggage.13. whenever possible, encryption and erasing technologies sh
31、ould be implemented in portable assets in case they were stolen.14. losses, theft, damages, tampering or other incident related to assets that compromises security must be reported as soon as possible to the information security officer.15. disposal of the assets must be done according to the specif
32、ic procedures for the protection of the information. assets storing confidential information must be physically destroyed in the presence of an information security team member. assets storing sensitive information must be completely erased in the presence of an information security team member befo
33、re disposing. www.fastitilsecurity policypage 93.access control policythis section of the security policy lists policies for securing access control.3.1 purpose specify what the intention of this policy section is.the access control policy section defines the requirements for the proper and secure c
34、ontrol of access to it services and infrastructure in the organization.3.2 scopewrite here whom this policy is aimed to. in doing so you are facilitating the distribution of policies to the target groups of users.this policy applies to all the users in the organization, including temporary users, vi
35、sitors with temporary access to services and partners with limited or unlimited access time to services.3.3 policy definitionslist here all the access control policies you have identified as necessary to regulate in your organization. formulate them in direct, understandable terms, avoiding language
36、 that can be too technical or to legal for the common user. avoid been too specific in procedures or too attached to technology. concentrate instead in formulating the policy itself. you may structure the policies inside this section in subcategories if you think it contributes to the clarity of the
37、 document.1.any system that handles valuable information must be protected with a password-based access control system. 2.any system that handles confidential information must be protected by a two factor -based access control system. 3.discretionary access control list must be in place to control t
38、he access to resources for different groups of users.4.mandatory access controls should be in place to regulate access by process operating on behalf of users.5.access to resources should be granted on a per-group basis rather than on a per-user basis.6.access shall be granted under the principle of
39、 “l(fā)ess privilege”, i.e., each identity should receive the minimum rights and access to resources needed for them to be able to perform successfully their business functions. www.fastitilsecurity policypage 107.whenever possible, access should be granted to centrally defined and centrally managed ide
40、ntities.8.users should refrain from trying to tamper or evade the access control in order to gain greater access than they are assigned.9.automatic controls, scan technologies and periodic revision procedures must be in place to detect any attempt made to circumvent controls. www.fastitilsecurity po
41、licypage 114.password control policythis section of the security policy lists policies for securing password control.4.1 purpose specify what the intention of this policy section is.the password control policy section defines the requirements for the proper and secure handling of passwords in the or
42、ganization.4.2 scopewrite here whom this policy is aimed to. in doing so you are facilitating the distribution of policies to the target groups of users.this policy applies to all the users in the organization, including temporary users, visitors with temporary access to services and partners with l
43、imited or unlimited access time to services.4.3 policy definitionslist here all the password control policies you have identified as necessary to regulate in your organization. formulate them in direct, understandable terms, avoiding language that can be too technical or to legal for the common user
44、. avoid been too specific in procedures or too attached to technology. concentrate instead in formulating the policy itself. you may structure the policies inside this section in subcategories if you think it contributes to the clarity of the document.1.any system that handles valuable information m
45、ust be protected with a password-based access control system. 2.every user must have a separate, private identity for accessing it network services.3.identities should be centrally created and managed. single sign-on for accessing multiple services is encouraged. 4.each identity must have a strong,
46、private, alphanumeric password to be able to access any service. they should be as least 8 characters long. 5.each regular user may use the same password for no more than 90 days and no less than 3 days. the same password may not be used again for at least one year.6.password for some special identi
47、ties will not expire. in those cases, password must be at least 15 characters long. www.fastitilsecurity policypage 127.use of administrative credentials for non-administrative work is discouraged. it administrators must have two set of credentials: one for administrative work and the other for comm
48、on work.8.sharing of passwords is forbidden. they should not be revealed or exposed to public sight.9.whenever a password is deemed compromised, it must be changed immediately.10. for critical applications, digital certificates and multiple factor authentication using smart cards should be used when
49、ever possible.11. identities must be locked if password guessing is suspected on the account. www.fastitilsecurity policypage 135.email policythis section of the security policy lists policies for the secure handling of electronic mail.5.1 purpose specify what the intention of this policy section is
50、.the email policy section defines the requirements for the proper and secure use of electronic mail in the organization.5.2 scopewrite here whom this policy is aimed to. in doing so you are facilitating the distribution of policies to the target groups of users.this policy applies to all the users i
51、n the organization, including temporary users, visitors with temporary access to services and partners with limited or unlimited access time to services.5.3 policy definitionslist here all the policies you have identified as necessary to regulate email in your organization. formulate them in direct,
52、 understandable terms, avoiding language that can be too technical or to legal for the common user. avoid been too specific in procedures or too attached to technology. concentrate instead in formulating the policy itself. you may structure the policies inside this section in subcategories if you th
53、ink it contributes to the clarity of the document.1.all the assigned email addresses, mailbox storage and transfer links must be used only for business purposes in the interest of the organization. occasional use of personal email address on the internet for personal purpose may be permitted if in d
54、oing so there is no perceptible consumption in the organization system resources and the productivity of the work is not affected. 2.use of the organization resources for non-authorized advertising, external business, spam, political campaigns, and other uses unrelated to the organization business i
55、s strictly forbidden.3.in no way may the email resources be used to reveal confidential or sensitive information from the organization outside the authorized recipients for this information. www.fastitilsecurity policypage 144.using the email resources of the organization for disseminating messages
56、regarded as offensive, racist, obscene or in any way contrary to the law and ethics is absolutely discouraged.5. use of the organization email resources is maintained only to the extent and for the time is needed for performing the duties. when a user ceases his/her relationship with the company, th
57、e associated account must be deactivated according to established procedures for the lifecycle of the accounts.6.users must have private identities to access their emails and individual storage resources, except specific cases in which common usage may be deemed appropriated.7.privacy is not guarant
58、eed. when strongest requirements for confidentiality, authenticity and integrity appear, the use of electronically signed messages is encouraged. however, only the information security officer may approve the interception and disclosure of messages. 8.identities for accessing corporate email must be
59、 protected by strong passwords. the complexity and lifecycle of passwords are managed by the companys procedures for managing identities. sharing of passwords is discouraged. users should not impersonate another user.9.outbound messages from corporate users should have approved signatures at the foo
60、t of the message.10. attachments must be limited in size according to the specific procedures of the organization. whenever possible, restrictions should be automatically enforced.11. whenever possible, the use of digital rights technologies is encouraged for the protection of contents.12. scanning
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年吉林省建筑安全員C證考試(專職安全員)題庫(kù)及答案
- 2025-2030年中國(guó)衣物柔順劑行業(yè)發(fā)展?fàn)顩r及營(yíng)銷戰(zhàn)略研究報(bào)告
- 2025-2030年中國(guó)薺藍(lán)油市場(chǎng)發(fā)展現(xiàn)狀規(guī)劃研究報(bào)告
- 2025-2030年中國(guó)硅酸鋯行業(yè)前景趨勢(shì)及發(fā)展規(guī)劃分析報(bào)告
- 2025-2030年中國(guó)礦物棉市場(chǎng)營(yíng)運(yùn)狀況及發(fā)展策略研究報(bào)告
- 2025波蘭數(shù)學(xué)奧林匹克(第二輪)試題
- 2025遼寧省建筑安全員B證考試題庫(kù)
- 合肥幼兒師范高等??茖W(xué)?!稘h字文化與創(chuàng)新設(shè)計(jì)》2023-2024學(xué)年第二學(xué)期期末試卷
- 河北美術(shù)學(xué)院《中小學(xué)教學(xué)名師論壇》2023-2024學(xué)年第二學(xué)期期末試卷
- 湖南電氣職業(yè)技術(shù)學(xué)院《現(xiàn)代辦公技能訓(xùn)練A》2023-2024學(xué)年第二學(xué)期期末試卷
- 多聯(lián)機(jī)空調(diào)系統(tǒng)設(shè)計(jì)課件
- 螺紋牙強(qiáng)度校核計(jì)算
- 技術(shù)規(guī)范書柴油發(fā)電機(jī)組
- 青島科技大學(xué)成人大?!豆ど唐髽I(yè)管理實(shí)訓(xùn)報(bào)告》
- 低鉀血癥最新版本最新課件
- 獸醫(yī)外科手術(shù)學(xué)與獸醫(yī)外科學(xué)章節(jié)測(cè)試及答案
- 2023年陜西延長(zhǎng)石油礦業(yè)有限責(zé)任公司招聘筆試題庫(kù)及答案解析
- YY/T 1792-2021熒光免疫層析分析儀
- GB/T 39235-2020豬營(yíng)養(yǎng)需要量
- GB/T 30799-2014食品用洗滌劑試驗(yàn)方法重金屬的測(cè)定
- 染廠公司簡(jiǎn)介(4個(gè)范本)
評(píng)論
0/150
提交評(píng)論