Time
38 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Description

This lesson covers how we'll manage the policy lifecycle. Chances are good that when you assume the role of CISO at an organization that there are already good policies in place. Effective management of the policy lifecycle, from creation to retirement will involve: - Reviewing the existing policies - Consolidation of policy Policy review should be regularly scheduled and executed at least once a year. Policy review should also be executed in the event of: - Changes to management structure - Changes to network infrastructure - On the occasion of major upgrades - When there were acquisitions Reviewers and approvers of policy must be identified. - Utilize Information Security Team, SME's, Auditors, legal, etc. - Determine who should be the reviewers and approvers for each update - Remember that ultimately it's up to the system owner to approve - Notify them that they will be asked to provide input - beforehand! - Provide an approximate schedule if possible When conducting reviews, you must: - Carefully review the materials that were sent - Determine whether the content and wording are acceptable - Be careful not to base an approval decision on whether or not the company is currently in compliance with the policy Approval should be based on the appropriateness of the requirements

Video Transcription

00:04
Okay, so let's move on and talk about the policy life cycle, which, ideally is, of course, covering the policy from its creation all the way through its retirement or revisions. So the idea is that once you come into a kn organization as a scissor
00:20
chances a really good they already have some policies and standards in place, right?
00:25
Rarely are you gonna be walking in the door and they go, You know, we never had a policy before.
00:30
It's not gonna happen. So most of the time, what you're looking at is you're being brought in and you're gonna be asked to evaluate the policies that are in place and make modifications, or at least recommendations. So we want to talk about the life cycle here
00:46
when the policies are already in place. Of course, the first thing you're gonna do is you're gonna look at them, you're gonna review them
00:52
and take into consideration. Um, you know what your ultimate goals are and what you want to accomplish, and whether or not those policies air satisfying those needs many contract to consolidate policies, policies convey very much be, you know, traditionally,
01:10
policies are very poorly written and not very well organized.
01:14
They're not really phones, any sort of standard for how there's policy should be developed. So you're probably gonna have to come in and evaluate them, man, to consolidate that, have to do some rewriting. And then you're gonna also make sure that the policies that you write or a valid way they reviewed on a
01:33
a regular basis
01:34
Usually you want to review these policies at least once a year
01:38
or in the event of a major change, new risks come up or, um,
01:45
uh, modification to your organization, like, uh
01:49
ah. Merger or something of that nature.
01:53
Okay, so we've got the policy that's already been written and were brought in. We're gonna evaluate this. So what we're looking to do is we're looking to conduct the gap analysis. Uh, we look at current state versus Desired state is we've talked about earlier. So where are we? Where do we need to be?
02:12
So we're gonna conduct an assessment of our policies. We're gonna look at him and figure out the gaps, and ideally, we're gonna be able to close those gas and get closer to our desire to ST.
02:23
So our first piece here. We're gonna look at the policies and see what's missing, because many kinds their policies don't cover certain areas. And we're going to get a very high level level list
02:38
off what we need. You know what policies need to be created where we need enhancements to policies and we're gonna have to work on prioritization. So we're gonna have to put those most significant gaps first and develop and spend. Our resource is in our attention there.
02:54
A What we're looking to do is to create a prioritized enhancement list. Here, the enhancements we need Thio implement based on priority. And this is something that will work with the auditor on because the auditor's gonna be the most cognizant of,
03:14
uh, with the desired state should
03:15
be what we have to do to get into compliance. So this is going to be something that the scissors gonna work very closely hand in hand with the odds. All right. Ah, and we have to have reviewers and approve Ear's a policy in place. That's our next piece is we want to make sure that we know
03:34
who's gonna review the policy and who's going to sign.
03:36
Oh,
03:37
so we talked about reviewing the policy. Depending on the type of policy, we may have different reviewers. Our security team, our subject matter experts legal may have to sign off whoever that may be. Whoever is
03:53
delegated with the responsibility of signing off on policy,
03:58
we have to make sure that that is established and documented. Now, ultimately, the system owner is gonna be the one to sign off on the policy. They're gonna be the ones to approve it, but we want to document those that are gonna review it. And you know what? Each step of the way we're gonna get that sign off.
04:16
Um, make sure your viewers know that this is something that you expect of them. Nothing worse than showing up with stack of folders and putting it on somebody's desk. So reviewers should know what their role is in relation to this gap analysis. Okay, what we're looking at here, what we should
04:34
provide when we're done is a list of reviewers
04:38
and approval.
04:39
Who is going to review this policy for logic? Who is going to approve it with a perspective of functionality? Who's gonna prove it with function of security? You know, all these folks how they're gonna work together, and ultimately, we're gonna have that document.
04:55
All right, so now we take that, we're gonna create our policy where there were missing policies. Of course, we're gonna create new ones. Were their existing policies were gonna bridge the gap between what we need? What's there?
05:09
So we've gotten the feedback from those people that we delegated to be reviewers, like our subject matter expert auditors, all the different, uh, people that we brought into our team.
05:23
And ultimately, we're gonna have them go through and help us review the policy piece by piece by piece. And ultimately, they're gonna be following that enhancement list. And ultimately, through this process, we're going to create new documents, were gonna update the existing documents. So,
05:42
uh, we're gonna take those people that we identified,
05:45
and we're gonna use their knowledge, their skill and expertise, and we're gonna create the new policies and modify the existing ones. Now, of course, those policies have to be reviewed. So we're gonna bring this to senior management to the system owner, and we're gonna ask them, you know, does this meet the needs
06:02
off the system business, meet the business units needs
06:06
whatever we want to make sure that
06:11
the policies not just cover security issue. We want to make sure that they're well written that they're easy to understand that they're complete in nature.
06:21
Um,
06:25
you know, this third bullet points kind of interesting don't basin approval decision on whether or not the company is currently in compliance or currently performs what's documented.
06:36
Matter of fact, the whole policies help us is supposed to help us get to the desired state
06:43
with the understanding that current state isn't there. So putting policy in place or modifying policy just cause you're not compliant, Obviously that's not how we do business, right? We put the policy in place, even if we're not compliant. And ideally, we're gonna develop procedures to get into compliance.
07:01
Ultimately, we get are completed. Review. Now we're gonna have this policy and we're always gonna get pushback. People do not like change. Many people feel like any change. Guard, Lis. What it is is gonna make their load heavier. So
07:17
be prepared for push back. You know, when we look at Oh, we can't do this.
07:24
Why?
07:25
Well, we don't have the technology. Maybe it's time for an upgrade.
07:29
Well, our people aren't trained, we train our people. And I'm not saying that there are instances where the answer really is. This isn't feasible. Well, that might mean that we need to document an exception to the policy wherever that may be. But as a general rule, expect push backs and prepare your case.
07:46
You know, this is what we have to do. Move in four.
07:49
Here's why. Here is the lost potential here, the benefits and let's make a good decision moving forward,
07:58
all right, And then we take the feedback that were given from the review. We're going to send this to the author's bring them all in, and we're gonna look at the reviews and the comments on the policies on these documents, and we're gonna make changes that's legitimate,
08:16
that are changes that are legitimate or from legitimate suggestions
08:20
and making sure that we evaluate those changes with other members of the reviewers team.
08:26
Um, make sure that we're clear and communicating the issues off policy, and you see how very much this is a team procedure. This isn't just Mia's. The CSO san mark. This word out at this world word we really do make sure that our policies were gonna be effective
08:46
and we're gonna satisfy the need.
08:46
And the way that we do that is we bring a team together.
08:50
Okay,
08:52
Um, now we've implemented the feedback and we've documented and he showed it changes were controlling the version ing of our policy. Now we believe that our policies well written and inclusive, we obtained approval
09:07
again. It's the system owners. Whether that system is an individual computer, it's division or team working together. We regardless of what that system is, we go to the system owners for approval. Also, you know, if we're talking about a company wide policy or individual entities that were
09:26
looking to create policy for
09:28
we go to the senior officers and we get there. Sign off
09:31
now, making sure again that we don't just take a stack of folders and sitting on somebody's desk. You know, this is gonna be something that ultimately we're really looking to gain approval. You know, this is our project that we've managed, and we feel like we've designed these policies to bring us into compliance.
09:50
We want to do our best to make these
09:52
easy to understand for senior management, not overwhelmed them. So maybe scheduling a time once a week, a couple of times a week to meet with them and go over policies for specific security risks or security functions, but making sure that we break it down and make it
10:13
manageable.
10:13
And ultimately what we are looking for is to get approval from the senior executives. These air the policies we want
10:22
now. At that point in time, we're really we've really completed the life cycle off the policy revision process.

Up Next

Policy Development

Security policy is a critical component of the design and further implementation of information systems. It outlines a set of rules and procedures that specify how the system should manage and safeguard sensitive information

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor