Tailoring Cybersecurity Policy Frameworks
A cybersecurity policy framework provides a general structure for organizing policy statements into a complete and coherent policy structure. Cybersecurity policies are not a one-size-fits-all documents, neither are the cybersecurity policy frameworks. In an author's effort to address all business needs, cybersecurity policy frameworks will often be tailored for the specific organization it serves.
Customer and Business Requirements
The organization may have several unique business requirements that drive the development of additional information security controls or even additional information security policies thus affecting the base framework. It is important to start with the framework but to be flexible enough to accommodate business needs when developing a platform upon which to build policies for an organization. For example, a pharmaceutical company may recognize extreme asset values in a building within which they work on new products. With these extreme asset values comes additional risks such as industrial espionage and a need for the implementation of additional physical security controls not present in other organizations. In the case that these controls are unique to some environments (e.g., data centers, research and development facilities) there may be a need to have an additional physical security controls policy for very sensitive areas.
Importance of Completeness
Even the most frequently cited or used information security frameworks have notable gaps in terms of information security controls. For example, the FISMA framework (based on NIST SP 800-53 controls) is not very specific when it comes to measurable elements of a security program (e.g., testing, validation, and assessment specifics). On the other hand the ISO 27001 framework does not provide many specific requirements in the area of network security (e.g., firewall architecture and settings, wireless access point isolation, secure DNS). In both cases, the standard is used as a general framework and the organization should review their own security needs to tailor the framework as needed to suit their business needs (e.g., expand the framework to include additional policies, topics, requirements, or specific values.
领英推荐
Adding and Mapping Regulations
Organizations will also need to tailor the information security policy framework for their own use according to the need to accommodate and map information security regulations, standards, and requirements. These policy additions stem from customer requests, industry regulations, and other business driven requirements. For each of the required information security requirement documents (e.g., Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI DSS), North American Electric Reliability Corporation Critical Infrastructure Protection Standards (NERC/CIP)), the organization should a) ensure all requirements are documented in the standard policy set and b) create a crosswalk that supports compliance reviews.
For assistance with cybersecurity policy development projects - Contact me [email protected].