Vous êtes sur la page 1sur 3

Journal Online

How to Write a Security Policy:


Network Security Policy Manual
Paul R. Meynen is an
For any security professional attempting to write security policy, providing business and IT context.
information security
a security policy, it is critical to understand The objective is to take the language from the
consultant in Chicago,
the difficulty and hair-pulling nature of the standard and develop the policy statements.
Illinois, USA. He completed
task. What should be written? How should The authors Network Security Policy Manual
the Network Security it be written? Who is responsible? Writing (NSPM)3 is based primarily on the Information
Policy Manual as part of information security policies is an art form. Security Forum (ISF)s The Standard of Good
an independent study Anyone who thinks that their organizations Practice 4 and secondarily on ISO 17799:20055
course at DePaul University, 80-page security manual underwent writing and from the International Organization for
administered by James Krev. approval in a couple of days should think again. Standardization (ISO).6
Meynen may be reached at This article explains the approach the author Focusing on the networks domain of the ISF
MeynenP@gmail.com. adopted to create the ultimate network security standard, the NSPM covers the requirements of
policy manual. While some policy requirements four of the five control objectives:
may be cost-prohibitive or a logistical headache Network management
in certain environments, the idea is similar to a Traffic management
holiday wish list where people list everything they Network operations
desire, except this is for a security environment. Local security management
This policy will evolve and mature as personal Voice networks (the fifth control objective,
experience advances, threats change and security not listed above) was not included in the scope
adapts. It is important to keep the policy of this policy. An easy way to write policy
breathing, as it is a living document; it should not statements is to transform the standards
be neglected. The security arena changes rapidly language into a policy statement, addressing
and the security policy must keep pace. an organizations acceptable level of risk. For
the purpose of the NSPM (and the scope of
Existing Resources and Policy Evolution the voice networks control objective of the ISF
How does one effectively transform ideas and standard), voice networks did not represent a
strategies into a security policy? Most security risk to the overall network and the domain was
professionals appreciate that executive support is subsequently dropped.
crucial to implement and sustain an information Additionally, the NSPM contains statements
security program. To acquire and maintain this not found in the ISF standard. Incorporating
support, the scope of the policy must be explicitly details beyond the scope of the standard, the
defined and the policy statements must be NSPM includes a control for network security
relevant and communicated to all employees. and contains significant detail in the firewall
Existing resources explain the process of control. An individual standard is not a single,
outlining a security policy manual including:1 encompassing solution; however, it may be
Purpose used to jumpstart thoughts and ideas on how to
Objective harden network security.
Applicability
Distribution Growing Pains
Enforcement Throughout the writing and review of the NSPM,
Monitoring a continual discovery process revealed small
Additionally, the SANS Institute has several changes to improve clarity of the policy. These
examples in its Security Policy Project.2 included:
An article may say to write a policy addressing Headings should be used to group common
risk; what does that mean? Risks to network policy statements.
security are defined by addressing security Roles and responsibilities must be defined
standards. This article details what to document to eliminate any doubt of responsibility. To
within the sections listed previously and how to accomplish this, roles should be grouped by
use a standard effectively to introduce a network position, e.g., director of network security,

ISACA JOURNAL VOLUME 1, 2009 1


network security engineers, network security architects. Early
drafts defined roles and responsibilities throughout the policy, Policy Writing Example No. 2
creating disjointedness and lacking cohesion. Defining roles The ISF standard suggests that to alleviate a malfunction of
and responsibilities in the beginning of the policy establishes network resources, a company should ensure that network
a foundation for managing the network security program. components may be recovered. The NSPM identifies that
Moreover, this section deserves special attention because critical systems must be recovered first and that capacity
under the umbrella of an enterprisewide information security must exist to recover those systems (figure 2). Furthermore,
program, roles and responsibilities would be defined within an the NSPM incorporates recovery time objectives from the
acceptable-use policy. With the narrow focus of the NSPM on business continuity plan, clearly specifying a value beyond
network security, the network management control objective critical timescales.
addresses roles and responsibilities.
A policy manual must be developed, as opposed to four
Policy Writing Example No. 3
individual policies. Using four separate policies would lack
One must avoid defining a product or technology as it creates
continuity, making it difficult to correlate statements across
restrictions. For example:
policies. While the four control objectives listed previously are
individual policies, creating a manual with chapters provides
External access should be provided using a
context and continuity throughout the entire policy. Moreover,
Kerberos authentication server, which should
defining metadata (e.g., applicability, distribution) in the
provide reliable and complete authentication for
introduction to the policy facilitates easier management, as all
external connections.
subsequent policies adhere to a single rule set.

This explicit definition will cause problems. If the


Policy Writing Example No. 1
authentication technology changes to another solution, the
An introduction must precede both a policy and its control
policy manual must be reviewed and updated. Instead, this
objectives. This provides context to the reader and places
policy statement must be used:
focus on the subsequent policy statements. The ISF standard
and ISO 17799 provide introductory statements prior to
A dedicated remote access server will be used for
each domain and control objective. Additionally, ISO 17799
all external access; it must authenticate external
uses implementation guidance for each control, offering
connections using a reliable and accepted access
direction when constructing policy statements. Leveraging
control (e.g., Kerberos, TACACS+, Radius).
the implementation guidance and summaries will assist in
introducing a domain and its associated control objective(s).
The term e.g. is very useful as it means for example
A standard, such as the ISFs, uses the word should
and is similar to including. In other words, e.g. allows for
consistently. The use of should in a policy will not suffice,
the mentioning of sample technologies while not intending to
as it leaves potential for interpretation and presents difficulty
list all possible solutions.
in enforcing policy following a security incident. A policy is a
set of rules; therefore, the words must or will are used to
Policy Writing Example No. 4
enforce the policy statements. See figure 1.
Finally, remember that the NSPM focuses on network
Figure 1Example 1 Policy Statement Development security. There are additional domains in the ISF and
Example: Principle and objective statements (from ISF) for Incident ISO 17799 standards that would exist within an
Management Control (NW3.3) enterprisewide security program. The NSPM seeks

 rinciple: All network incidentsof any typeshould be


P Figure 2Example 2 Policy Statement Development
recorded, reviewed and resolved using an incident management
process. Example: Network Resilience Control (NW1.3.3) (from ISF).

 bjective: To identify and resolve network incidents effectively,


O The risk of malfunction of critical communications equipment,
their business impact should be minimized, reducing the risk of software, links and services should be reduced by ensuring that key
similar incidents occurring. network components can be replaced within critical timescales.

Policy statement: Any incident occurring on the network must be Policy statement: To mitigate the risk and effects of a malfunction,
recorded, reviewed and resolved following an established incident priority must be given to critical system segments and proper
management process. Incident management allows for rapid response capacity allocated to those segments by ensuring that key network
and efficient resolution to mitigate impact to the business and future components are capable of being replaced within the specified
risk of similar incidents. recovery time objectives.

2 ISACA JOURNAL VOLUME ONE 2009


to encompass the aspects of the enterprise program while www.giac.org/certified_professionals/practicals/gsec/4276.php.
not defining rules that would be out of scope. For example, Gartenberg, Marc; How to Develop an Enterprise Security
the wireless access control in the NSPM states: Policy, ComputerWorld, January 2005, www.computerworld.
com/securitytopics/security/story/0,10801, 98896,00.html.
Documentation must be maintained for wireless Ungerman, Mark; Creating and Enforcing an Effective
connections. It must include the configuration Information Security Policy, Information Systems Control
of wireless hardware to maintain point-to-point Journal, ISACA, vol. 6, 2005
hardware encryption of a minimum strength. 2
SANS Institute, Security Policy Project,
www.sans.org/resources/policies
Defining a 128-bit encryption standard, for example, is 3
The Network Security Policy Manual is an original,
beyond the scope of the NSPM. This policy statement would copyrighted creation of the author (Paul Meynen). To obtain
belong within an acceptable encryption policy. a copy of the NSPM, please e-mail MeynenP@gmail.com.
4
Information Security Forum, The Standard of Good Practice,
Conclusion https://www.isfsecuritystandard.com/SOGP07/index.htm
Writing security policies is challenging. It requires the
5
International Organization for Standardization,
coordination of resources and cooperation of employees ISO 17799:2005, Information TechnologySecurity
throughout the company. However, policy writing is an TechniquesCode of Practice for Information Security
indispensable skill, because, when a policy is established, it Management, 2005, www.iso.org
must undergo reviews and updates (most often annually).
6
A copy of ISO 17799:2005 was not obtained by the author
Maintenance of the security policy is equally important for until the end of the course in which he developed the NSPM.
daily business activities and defense against internal and Consequently, there was not sufficient time to incorporate all
external malicious threats. The security of personnel data and the additional policy statements recommended in
customers personally identifiable information is imperative to ISO 17799:2005. However, ISO 17799:2005 presents
the business. Securing credit card data, medical information an incredible level of detail and is a robust standard to
or (in the US) a Social Security number, for example, is the implement a security program. As the NSPM evolves, the
basis of the NSPM. It is the heart of an enterprise information implementation guidance (explained later) in the ISO
security program. standard will be leveraged to incorporate new statements
into the NSPM.
Endnotes
Authors Note
1
Simon, Mark; An Enterprise Security Policy Management
Framework Part 1 & 2, ISSA Journal, February 2008, The author would like to thank James Krev for his patience
www.issa.org/Members/Journals-Archive/2008.html. SANS and guidance in support of this research at DePaul University,
Institute, Building a Security Policy Framework for a as well as Jacob Furst and Linda Allen for their meticulous
Large, Multi-national Company, January 2005, editing of the work.

The ISACA Journal is published by ISACA. Membership in the association, a voluntary organization serving ITgovernance professionals, entitles one to receive an annual subscription
to the Information Systems Control Journal.

Opinions expressed in the ISACA Journal represent the views of the authors and advertisers. They may differ from policies and official statements of ISACA and/or the IT Governance
Institute and their committees, and from opinions endorsed by authors employers, or the editors of this Journal. ISACA Journal does not attest to the originality of authors content.

2009 ISACA. All rights reserved.

Instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. For other copying, reprint or republication, permission must be obtained in
writing from the association. Where necessary, permission is granted by the copyright owners for those registered with the Copyright Clearance Center (CCC), 27 Congress St.,
Salem, Mass. 01970, to photocopy articles owned by ISACA, for a flat fee of US $2.50 per article plus 25 per page. Send payment to the CCC stating the ISSN (1526-7407), date,
volume, and first and last page number of each article. Copying for other than personal use or internal reference, or of articles or columns not owned by the association without
express permission of the association or the copyright owner is expressly prohibited.

www.isaca.org

ISACA JOURNAL VOLUME 1, 2009 0

Vous aimerez peut-être aussi