Thursday, April 26, 2012

Security Polcies

So, today we talk about Security Policies, what are Security Policy and what are their functions?


A Security Policy is created to:

1) form a baseline of the current security posture2) set the framework for security impelemtation3) define authorized and unauthorized behaviors4) define how security incidents are handled


There are 4 major steps of a security policy.

StepProcedureUsable elements of security
Step 1: SecureImpementing Security solutions to prevent unauthorized activities.
-Authentication
-Encryption
-Firewalls
-Vulnerability Patching

StepProcedure
Step 2: MonitorAuditing of Security implementation in Step 1 and the detection of violations in security policies.

StepProcedure
Step 3: TestOften known in industry as PEN-testing (Penetration Testing). Procedure includes the auditing of seurity policies.

StepProcedure
Step 4: ImproveTakes effect mainly after the Step 3, as testing will usually provide the scope of loopholes left out during step 1 and 2.


Ulimately, the requirement of the access provided to users by this security policies depends on the organization or platform it is being built on. an Enterprise Network will usually have a more restrictive Security Policy, while a open or home network will have a more open Security policy.

No comments:

Post a Comment