Security Policy TemplateFree ITIL TemplatesIT 安全策略模板自由ITIL模板它.doc

上传人:仙人指路1688 文档编号:2386469 上传时间:2023-02-17 格式:DOC 页数:24 大小:176KB
返回 下载 相关 举报
Security Policy TemplateFree ITIL TemplatesIT 安全策略模板自由ITIL模板它.doc_第1页
第1页 / 共24页
Security Policy TemplateFree ITIL TemplatesIT 安全策略模板自由ITIL模板它.doc_第2页
第2页 / 共24页
Security Policy TemplateFree ITIL TemplatesIT 安全策略模板自由ITIL模板它.doc_第3页
第3页 / 共24页
Security Policy TemplateFree ITIL TemplatesIT 安全策略模板自由ITIL模板它.doc_第4页
第4页 / 共24页
Security Policy TemplateFree ITIL TemplatesIT 安全策略模板自由ITIL模板它.doc_第5页
第5页 / 共24页
点击查看更多>>
资源描述

《Security Policy TemplateFree ITIL TemplatesIT 安全策略模板自由ITIL模板它.doc》由会员分享,可在线阅读,更多相关《Security Policy TemplateFree ITIL TemplatesIT 安全策略模板自由ITIL模板它.doc(24页珍藏版)》请在三一办公上搜索。

1、www.FastITILSecurity PolicyCompany NameCompany NameStreet AddressCity, State Zip CodeCreation DateNotes: The following template is provided for writing an Information Security Policy document. Inside each section, text in green font between brackets is included to provide guidance to the author and

2、should be deleted before publishing the final document. Inside each section, text in black font is included to provide a realistic example. Inside the example, text in underlined, blue font indicates a possible hyperlink to a report or document. You are free to edit and use this template and its con

3、tents within your organization; however, we do ask that you dont distribute this template on the web without explicit permission from us.Copyrights: ITIL is a Registered Trade Mark of the Office of Government Commerce in the United Kingdom and other countries.Document ControlPreparationActionNameDat

4、eReleaseVersionDate ReleasedChange NoticePages AffectedRemarksDistribution ListNameOrganizationTitleTable of Contents1.INTRODUCTION41.1Purpose41.2Scope41.3Definitions, Acronyms, and Abbreviations41.4References61.5Overview62.BASIC INFORMATION72.1Business Units.72.2Categorization of Services72.3List o

5、f services83.SERVICE TEMPLATE94.SERVICE CATALOGUE114.1Storage Services115.ANNEX145.1List of Tables141. IntroductionThe Information Security Policy states the types and levels of security over the information technology resources and capabilities that must be established and operated in order for tho

6、se items to be considered secure. The information can be gathered in one or more documents.You can structure policies in as many sections as you identify as valid in your organization. In the example below, sections have been selected according from the recommendations in the ITIL guidance. You may

7、include more sections as far as you detect more technologies in your company to be addressed with specific policies. Sections have been written all together in one document. You may as well separate them into independent policy documents for easier managing, e.g. one for Email policies, other for In

8、ternet policies and so on.1.1 PurposeSpecify the intention of the entire Security Policy.This Security Policy document is aimed to define the security requirements for the proper and secure use of the Information Technology services in the Organization. Its goal is to protect the Organization and us

9、ers to the maximum extent possible against security threats that could jeopardize their integrity, privacy, reputation and business outcomes.1.2 ScopeDefine here the scope where policies in the whole document apply.This document applies to all the users in the Organization, including temporary users

10、, visitors with temporary access to services and partners with limited or unlimited access time to services. Compliance with policies in this document is mandatory for this constituency.1.3 HistoryThis section of the Security Policy is aimed to check the life time of a specific version of the whole

11、document. In case you separate into several policy documents, ensure there is a version history for each one of them. Policies must be reviewed and eventually updated periodically to keep up with changes in risks, technologies and regulations.VersionDescriptionFromToAuthor1.0Initial version8/1/20xx7

12、/1/20xxJohn Doe1.4 ResponsibilitiesIdentify all the roles involved and their responsibilities in the enforcement of the policies in this document.RolesResponsibilitiesChief Information Officer Accountable for all aspects of the Organizations information security.Information Security Officer Responsi

13、ble for the security of the IT infrastructure. Plan against security threats, vulnerabilities, and risks. Implement and maintain Security Policy documents. Ensure security training programs. Ensure IT infrastructure supports Security Policies. Respond to information security incidents. Help in disas

14、ter recovery plans.Information Owners Help with the security requirements for their specific area. Determine the privileges and access rights to the resources within their areas. IT Security Team Implements and operates IT security. Implements the privileges and access rights to the resources. Suppo

15、rts Security Policies.Users Meet Security Policies. Report any attempted security breaches.1.5 General Policy DefinitionsList here all the security policies that are global to the whole document and not belonging to a specific section. Formulate them in direct, understandable terms, avoiding languag

16、e that can be too technical or to legal for the common user. Avoid been too specific in procedures or too attached to technology. Concentrate instead in formulating the policy itself. You may structure the policies inside this section in subcategories if you think it contributes to the clarity of th

17、e document.1. Exceptions to the policies defined in any part of this document may only be authorized by the Information Security Officer. In those cases, specific procedures may be put in place to handle request and authorization for exceptions. 2. Every time a policy exception is invoked, an entry

18、must be entered into a security log specifying the date and time, description, reason for the exception and how the risk was managed.3. All the IT services should be used in compliance with the technical and security requirements defined in the design of the services. 4. Infractions of the policies

19、in this document may lead to disciplinary actions. In some serious cases they could even led to prosecution.2. IT Assets Policy This section of the Security Policy lists policies for the secure handling of the IT assets.2.1 Purpose Specify what the intention of this policy section is.The IT Assets P

20、olicy section defines the requirements for the proper and secure handling of all the IT assets in the Organization.2.2 ScopeWrite here whom this policy is aimed to. In doing so you are facilitating the distribution of policies to the target groups of users.The policy applies to desktops, laptops, pr

21、inters and other equipment, to applications and software, to anyone using those assets including internal users, temporary workers and visitors, and in general to any resource and capabilities involved in the provision of the IT services.2.3 Policy DefinitionsList here all the IT Asset policies you

22、have identified as necessary to regulate in your organization. Formulate them in direct, understandable terms, avoiding language that can be too technical or to legal for the common user. Avoid been too specific in procedures or too attached to technology. Concentrate instead in formulating the poli

23、cy itself. You may structure the policies inside this section in subcategories if you think it contributes to the clarity of the Security Policy document.1. IT assets must only be used in connection with the business activities they are assigned and / or authorized.2. All the IT assets must be class

24、ified into one of the categories in the Organizations security categories; according to the current business function they are assigned to.3. Every user is responsible for the preservation and correct use of the IT assets they have been assigned.4. All the IT assets must be in locations with securit

25、y access restrictions, environmental conditions and layout according to the security classification and technical specifications of the aforementioned assets.5. Active desktop and laptops must be secured if left unattended. Whenever possible, this policy should be automatically enforced.6. Access to

26、 assets is forbidden for non-authorized personnel. Granting access to the assets involved in the provision of a service must be done through the approved Service Request Management and Access Management processes.7. All personnel interacting with the IT assets must have the proper training.8. Users

27、shall maintain the assets assigned to them clean and free of accidents or improper use. They shall not drink or eat near the equipment.9. Access to assets in the Organization location must be restricted and properly authorized, including those accessing remotely. Companys laptops, PDAs and other equ

28、ipment used at external location must be periodically checked and maintained.10. The IT Technical Teams are the sole responsible for maintaining and upgrading configurations. None other users are authorized to change or upgrade the configuration of the IT assets. That includes modifying hardware or

29、installing software.11. Special care must be taken for protecting laptops, PDAs and other portable assets from being stolen. Be aware of extreme temperatures, magnetic fields and falls.12. When travelling by plane, portable equipment like laptops and PDAs must remain in possession of the user as han

30、d luggage.13. Whenever possible, encryption and erasing technologies should be implemented in portable assets in case they were stolen.14. Losses, theft, damages, tampering or other incident related to assets that compromises security must be reported as soon as possible to the Information Security

31、Officer.15. Disposal of the assets must be done according to the specific procedures for the protection of the information. Assets storing confidential information must be physically destroyed in the presence of an Information Security Team member. Assets storing sensitive information must be comple

32、tely erased in the presence of an Information Security Team member before disposing. 3. Access Control PolicyThis section of the Security Policy lists policies for securing access control.3.1 Purpose Specify what the intention of this policy section is.The Access Control Policy section defines the r

33、equirements for the proper and secure control of access to IT services and infrastructure in the Organization.3.2 ScopeWrite here whom this policy is aimed to. In doing so you are facilitating the distribution of policies to the target groups of users.This policy applies to all the users in the Orga

34、nization, including temporary users, visitors with temporary access to services and partners with limited or unlimited access time to services.3.3 Policy DefinitionsList here all the access control policies you have identified as necessary to regulate in your organization. Formulate them in direct,

35、understandable terms, avoiding language that can be too technical or to legal for the common user. Avoid been too specific in procedures or too attached to technology. Concentrate instead in formulating the policy itself. You may structure the policies inside this section in subcategories if you thi

36、nk it contributes to the clarity of the document.1. Any system that handles valuable information must be protected with a password-based access control system. 2. Any system that handles confidential information must be protected by a two factor -based access control system. 3. Discretionary access

37、control list must be in place to control the access to resources for different groups of users.4. Mandatory access controls should be in place to regulate access by process operating on behalf of users.5. Access to resources should be granted on a per-group basis rather than on a per-user basis.6. A

38、ccess shall be granted under the principle of “less privilege”, i.e., each identity should receive the minimum rights and access to resources needed for them to be able to perform successfully their business functions.7. Whenever possible, access should be granted to centrally defined and centrally

39、managed identities.8. Users should refrain from trying to tamper or evade the access control in order to gain greater access than they are assigned.9. Automatic controls, scan technologies and periodic revision procedures must be in place to detect any attempt made to circumvent controls.4. Password

40、 Control PolicyThis section of the Security Policy lists policies for securing password control.4.1 Purpose Specify what the intention of this policy section is.The Password Control Policy section defines the requirements for the proper and secure handling of passwords in the Organization.4.2 ScopeW

41、rite here whom this policy is aimed to. In doing so you are facilitating the distribution of policies to the target groups of users.This policy applies to all the users in the Organization, including temporary users, visitors with temporary access to services and partners with limited or unlimited a

42、ccess time to services.4.3 Policy DefinitionsList here all the Password Control policies you have identified as necessary to regulate in your organization. Formulate them in direct, understandable terms, avoiding language that can be too technical or to legal for the common user. Avoid been too spec

43、ific in procedures or too attached to technology. Concentrate instead in formulating the policy itself. You may structure the policies inside this section in subcategories if you think it contributes to the clarity of the document.1. Any system that handles valuable information must be protected wit

44、h a password-based access control system. 2. Every user must have a separate, private identity for accessing IT network services.3. Identities should be centrally created and managed. Single sign-on for accessing multiple services is encouraged. 4. Each identity must have a strong, private, alphanum

45、eric password to be able to access any service. They should be as least 8 characters long. 5. Each regular user may use the same password for no more than 90 days and no less than 3 days. The same password may not be used again for at least one year.6. Password for some special identities will not e

46、xpire. In those cases, password must be at least 15 characters long.7. Use of administrative credentials for non-administrative work is discouraged. IT administrators must have two set of credentials: one for administrative work and the other for common work.8. Sharing of passwords is forbidden. The

47、y should not be revealed or exposed to public sight.9. Whenever a password is deemed compromised, it must be changed immediately.10. For critical applications, digital certificates and multiple factor authentication using smart cards should be used whenever possible.11. Identities must be locked if password guessing is suspected on the account.5. Email PolicyThis section of the Security Policy lists policies for the secure handling of electronic mail.5.1 Purpose Specify what the intention of this policy section is.The Email Policy s

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 建筑/施工/环境 > 项目建议


备案号:宁ICP备20000045号-2

经营许可证:宁B2-20210002

宁公网安备 64010402000987号