Policy’s scope and whom it covers

 

 

Create an Incident Response Policy (0/7 completed)Note: There are many types of incident response plans. Remember that a plan is different from a policy. A policy is a high-level document that describes the organization’s stance on the particular topic and how it will comply with related governance and laws. A plan, on the other hand, is how the policy will be executed. An incident response plan should be generic enough to cover a variety of scenarios but also specific enough that an organization can quickly mobilize during an incident. Names of specific people should never be used in an incident response plan. Rather, roles and titles should define who is responsible for what portion(s) of the plan.

1. Navigate to “Security Policy Templates” at https://www.sans.org/information-security-policy/, then locate and review the “Security Response Plan Policy”.
2. Describe how this policy would be associated with an incident response plan.
Note: When responding to an incident, remember who the provider of information is and who the consumer is. Senior management approves the response policy and budget, but it does not possess the subject matter expertise to handle the incident. Meanwhile, the incident response team should make only recommendations to management, not make decisions that might impact business. It is up to senior management to either give or deny approval.
Management remains the consumer and chief decider, based on information provided to it by the experts.

1. Review the following characteristics of the fictional Bankwise Credit Union:

The organization is a local credit union that has several branches and locations throughout the region.
Online banking and use of the internet are the bank’s strengths, given its limited human resources.
The customer service department is the organization’s most critical business function.
The organization wants to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
The organization wants to monitor and control use of the internet by implementing content filtering.
The organization wants to eliminate personal use of organization-owned IT assets and systems.
The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training.
The organization wants to create an incident response team to deal with security breaches and other incidents if attacked and provide full authority for the team to perform whatever activities are needed to maintain chain of custody in performing forensics and evidence collection.
The organization wants to implement this policy throughout the organization to provide full authority during a crisis to the incident response team over all physical facilities, IT assets, IT systems, applications, and data owned by the organization.
1. Create an incident response policy that grants team members full access and authority to perform forensics and maintain a chain of custody for physical evidence containment. Create this policy for the Bankwise Credit Union.
Bankwise Credit Union
Incident Response Team – Access and Authorization Policy
Policy Statement
Insert policy verbiage here.

Purpose/Objectives
Insert the policy’s purpose as well as its objectives; use a bulleted list for the policy definition. Define the incident response team members and the authorization and authority granted to them during a crisis or while securing an incident situation.

Scope
Define this policy’s scope and whom it covers. What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside of standard protocol?

 

 

This question has been answered.

Get Answer