Let's Demystify Cybersecurity Policies, Standards and Procedures

What are they? Are Policies at the Top or Bottom of the Pyramid? How Many Are Needed?

Hi,

This outline of Cybersecurity Governance questions is for an upcoming discussion with Study GRC and the broader Simply Cyber community.

  • Do you have resources to add? 📚️ 

  • Opinions? 🗣️ 

  • Hot takes?! 🔥 

Questions and feedback are welcome! Join the discussion at:

See you there!

Steve

Contents

1. Why do Policies Matter?

Due diligence is establishing a plan, policy, and processes to protect the interests of the organization.

Due care is practising the individual activities that maintain the due diligence effort.

For example, due diligence is developing a formalized security structure containing a security policy, standards, baselines, guidelines, and procedures. Due care is the continued application of this security structure into the IT infrastructure of an organization.

In today’s business environment, prudence is mandatory. Showing due diligence and due care is the only way to disprove negligence and occurrence of loss. Senior management must show due care and due diligence to reduce their culpability and liability when a loss occurs. 

CISSP Official Study Guide, 9th Edition

2. đź“ś Definitions: Getting on the Same Song Sheet

2.1 CISSP Official Study Guide

Policies: Setting the Tone

A security policy is a document that defines the scope of security needed by the organization and discusses the assets that require protection and the extent to which security solutions should to to provide necessary protection.

The security policy is used to assign responsibilities, define roles, specify audit requirements, outline enforcement processes, indicate compliance requirements, and define acceptable risk levels.

CISSP OSG 9th Edition

Policies are the foundation of any cybersecurity program and set tone at the top. They define the scope of security needed by the organization, discuss the assets that require protection, and outline the extent to which security solutions should go to provide that protection.

A well-crafted security policy assigns responsibilities, defines roles, specifies audit requirements, outlines enforcement processes, indicates compliance requirements, and defines acceptable risk levels. In plain language, policies answer the question: what are the cybersecurity-related expectations for employees?

For example, a policy might state that accounts exposed to the Internet must have Multi-Factor Authentication, not just passwords. Or that strictly confidential data, such as patient records, must be encrypted when exposed to the Internet.

Ideally, policies are clear on expectations, using "must" instead of "should." They need to be followed consistently to avoid being perceived as toothless. If a Security Operations Center (SOC) detects a risky, unauthorized activity by an employee, unclear policies with too much wiggle room can result in the SOC Analyst being accused of causing undue security friction.

It's also important to note that security policies shouldn't be aspirational. This creates the same wiggle room problem if interpreted as applying to some systems or teams and not others. It also causes audit deficiencies at compliance assessment time if you're found to not be doing what you say you do in the policy.

A balancing point here as we strive to both protect and enable the business, is to not make policies too heavy handed. I think the free SANS templates recommended by the Center for Internet Security do a great job at this. They’re also great at explaining to employees why they exist and are important, e.g. “not to impose restrictions that are contrary to <Company Name>’s established culture of openness, trust and integrity. <Company Name> is committed to protecting employees, partners and the company from illegal or damaging actions by individuals, either knowingly or unknowingly.”

Another great reference to study is the publicly available policies over at GitLab:

Standards: Defining the Requirements

Standards define compulsory requirements for the homogenous use of hardware, software, technology and security controls. They provide a course of action by which technology and procedures are uniformly implemented throughout an organization.

CISSP OSG 9th Edition

The example SANS Information Logging Standard below specifies that “systems shall ensure integrity to support enterprise-level analysis and reporting.” A common way to achieve this is to have an independent Security Information and Event Management (SIEM) system with least privilege access that is tamper-proof, so even if a hacker has compromised a system, they can't access SIEM logs to cover their tracks.

The Wireless Communication Standard template here is a other good example, listing specific, vendor agnostic requirements to harden their configurations to reduce attack surface and vulnerability to being compromised.

Procedures: The Step-by-Step Guide

Procedures are the final element of the formalized security policy structure. A procedure or standard operating procedure (SOP) is a detailed, step-by-step how-to document that describes the exact actions necessary to implement a specific security mechanism, control or solution.

CISSP OSG 9th Edition

Procedures are the lowest level. They're basically step-by-step instructions for implementing a specific control or solution. If a standard says that event logs have to be centralized, the procedure would explain exactly how to set that up on your systems.

One thing to consider with procedures is that you may want to record a screencast instead of writing out every detail. A screencast can be easier to follow, and quicker to create. Whichever format you choose, the key is to make the procedure detailed enough that anyone can follow it, even if they're not an expert.

2.2 SANS

Policy Period Component

Definition

Principle

The highest-level ideas and values that serve as reference points to guide organizational conduct

Policy

High-level, mandatory statements used to define a course of action to govern enterprise behavior and address specific systems, methods or techniques

Standard

Medium-level instructions that provide prescribed levels or criteria to follow when applying policies throughout an organization

Guideline

Lower-level best practices designed to achieve policy objectives where factors may prevent rigid requirements

Procedure

Individual, discrete steps employees follow when performing duties that are repeatable and operational

Baseline

Most specific set of instructions or documents that contain configuration requirements

2.3 GRC Masterclass

Policies

âťť

Policy is the will of the organization

Gerald Auger
  • Purpose

  • Scope

  • Policy content

  • Compliance

    • What happens if someone doesn’t comply?

  • Management support/sign-off

Standards

Standards are values assigned for certain aspects of organizational policy. How many days until passwords need to be changed? How many people allowed in the data center at any time?

Gerald Auger

An Identity and Access Management standard would include password security requirements for different types of accounts such as:

  1. Length:

    • Minimum of X characters.

  2. Complexity:

    • Include a mix of uppercase and lowercase letters, numbers, and special characters.

    • Ensure the presence of at least one character from each of these categories.

  3. Avoiding Common Passwords:

    • Implement a denied password list (e.g. the ROCKU database of leaked passwords) to prevent the use of commonly used, weak, or easily guessable passwords.

  4. Password History:

    • Prevent the reuse of the last 5-10 passwords to minimize the risk of credential stuffing attacks.

  5. Expiration:

    • Set password expiration to at least every 90 days. However, consider longer periods if strong multi-factor authentication (MFA) is enforced and monitoring is robust.

  6. Lockout Policy:

    • Implement account lockout after a specified number of failed login attempts (e.g., 5 attempts) to deter brute force attacks.

    • Define a lockout duration (e.g., 15 minutes) or require manual unlock by an administrator.

  7. Multi-Factor Authentication (MFA):

    • Require MFA for all users, particularly for accessing sensitive systems or performing high-risk actions.

    • Use various forms of MFA, such as SMS-based OTP, authenticator apps, or hardware tokens.

  8. Password Storage:

    • Ensure passwords are stored using strong, salted hash functions (e.g., bcrypt, Argon2).

    • Avoid reversible encryption for password storage.

  9. Password Change Requirements:

    • Enforce password changes upon first login and after suspected compromise.

    • Allow users to change their passwords proactively through a secure self-service process.

Procedures

Procedures are how a process is supposed to be executed by an individual. When processes are done consistently, you can expect timely and quality execution. During incidents time is critical so good processes are important.

Gerald Auger
  • A recipe.

  • Documentation that outlines how a policy will be implemented.

  • How to do password resets

    • Admin console

    • Self-service portal

    • Help Desk identity verification process

      • “Hey I’m the CEO, change my password!”

  • Way more effective to record (e.g. with Loom) procedures than to write static documents that take a lot of effort to maintain - and rarely are maintained in practice.

2.4 NIST

Information Security Policy: Aggregate of directives, regulations, rules, and practices that prescribes how an organization manages, protects, and distributes information.

NIST SP 800-53, Revision 5 ("Security and Privacy Controls for Information Systems and Organizations") Glossary

Security Policy: A set of criteria for the provision of security services. A set of rules that governs all aspects of security-relevant system and system component behavior

NIST SP 800-53, Revision 5 ("Security and Privacy Controls for Information Systems and Organizations") Glossary

2.5 ISACA

ISACA defines an information security policy as a high-level, comprehensive document that outlines an organization's security objectives, rules, and the responsibilities for ensuring information security. Specifically, the COBIT 5 framework and ISACA's CISM Review Manual provide similar definitions:

  • An information security policy is:

    • A document that outlines the security management directives of an organization.

    • It is designed to ensure that information assets are adequately protected from threats and vulnerabilities.

    • It provides the guiding principles and expectations for managing and protecting information and is generally aligned with the organization's overall objectives.

  • It is typically approved by senior management and communicated to all relevant stakeholders.

A standard is a set of mandatory requirements or rules that specify the behavior or processes needed to meet a particular policy or objective. In COBIT 5, standards are described as:

  • Formalized rules or criteria that define what must be done to comply with policies.

  • Standards ensure uniformity and consistency in applying security measures across the organization.

  • They provide specific details on how policies are to be implemented and are typically more prescriptive than policies themselves.

2.6 ISO27001

Clause 5.2 requires organizations to establish an information security policy that:

  • Is appropriate to the organization's purpose.

  • Includes objectives related to information security.

  • Provides a framework for setting information security objectives.

  • Includes commitments to meet applicable requirements and continuous improvement of the ISMS.

  • Is communicated within the organization and available to relevant interested parties.

3. ▲🔄 Are Policies at the Top of the Pyramid or the Bottom?

3.1 Seven Security Group Says Top

3.2 SANS Agrees

3.3 GRC Masterclass Says Bottom

  • Policies are at the bottom of the pyramid, providing the base foundation of expected behaviour

  • Then on top of that foundation, standards and procedures illustrate how the policy should be implemented

3.4 Compliance Forge Agrees

3.5 Bottom-Line Both Pyramids Are Correct

  • By importance, policies are the bottom of the pyramid

  • By volume, they are academically the top

    • More systems, people and processes with standards and procedures

    • Although, in practice it would be a big time investment to maintain lots of standard and procedure documents

4. 🤔 Which Policies and Standards, and How Many?

4.1 GRC Masterclass Guidance

Generally the number of policies ranges from 1 for a small company to 20 with one per SP800-53 control family

Dr Gerald Auger, GRC Analyst Masterclass

4.2 SANS Guidance

  • Page 7

    • Security Awareness at the core, then:

      • Asset Identification & Classification

      • Asset Protection

      • Asset Management

      • Acceptable Use

      • Vulnerability Assessment & Management

      • Threat Assessment & Monitoring

      • Business Continuity & DRP

      • Physical Security

1. Asset Identification & Classification

  • Control Family: PL - Planning and CM - Configuration Management

    • PL-8: Information Security Architecture refers to the identification of assets and their role in the organization's information security posture.

    • CM-8: Information System Component Inventory focuses on maintaining an inventory of system assets and ensuring they are classified and tracked.

2. Asset Protection

  • Control Family: MP - Media Protection and SC - System and Communications Protection

    • MP-2: Media Access protects the access to organizational assets (information systems, data).

    • SC-28: Protection of Information at Rest covers the measures taken to protect data in storage and assets across systems.

3. Asset Management

  • Control Family: CM - Configuration Management and PM - Program Management

    • CM-8: Information System Component Inventory addresses the management of assets and ensuring they are identified and tracked.

    • PM-5: Information Security Resources ensures appropriate resources are allocated for managing assets.

4. Acceptable Use

  • Control Family: AC - Access Control and AT - Awareness and Training

    • AC-1: Access Control Policy focuses on ensuring users understand the acceptable use of information systems.

    • AT-2: Security Awareness Training includes educating users on acceptable use policies and their responsibilities.

5. Vulnerability Assessment & Management

  • Control Family: RA - Risk Assessment and SI - System and Information Integrity

    • RA-5: Vulnerability Monitoring and Scanning covers processes to identify and assess vulnerabilities.

    • SI-2: Flaw Remediation addresses vulnerability remediation and continuous system updates.

6. Threat Assessment & Monitoring

  • Control Family: CA - Security Assessment and Authorization and SI - System and Information Integrity

    • CA-7: Continuous Monitoring ensures threats are continuously monitored and risk is evaluated.

    • SI-4: Information System Monitoring handles monitoring system activities to detect and respond to threats.

7. Business Continuity & Disaster Recovery Plan (DRP)

  • Control Family: CP - Contingency Planning

    • CP-1: Contingency Planning Policy and Procedures cover the policies that guide business continuity and disaster recovery.

    • CP-9: System Backup ensures proper backup mechanisms for recovery in case of failure.

8. Physical Security

  • Control Family: PE - Physical and Environmental Protection

    • PE-3: Physical Access Control addresses the physical security of facilities and systems.

    • PE-2: Physical Access Authorizations deals with policies to limit physical access to systems and assets.

4.3 IS5540

4.4 SOC2

Not big on documeted policies as long as you’re performing the controls.

The SOC 2 (System and Organization Controls) Trust Services Criteria are designed to assess the controls an organization has in place regarding security, availability, processing integrity, confidentiality, and privacy. These criteria outline key cybersecurity policies that organizations need to implement. Here are the key policies aligned with the SOC 2 Trust Services Criteria:

1. Information Security Policy

  • SOC 2 Criteria: Common Criteria (CC1.1), Security (CC6.1)

  • Purpose: Establishes the overall approach to information security management within the organization.

  • Content: Defines the organization's security objectives and commitment to protect sensitive data.

2. Access Control Policy

  • SOC 2 Criteria: CC6.2, CC6.3, CC6.4

  • Purpose: Controls access to systems and data based on the principle of least privilege.

  • Content: Outlines authentication methods, authorization levels, and management of user access.

3. Risk Management Policy

  • SOC 2 Criteria: CC3.1, CC3.2

  • Purpose: Guides the identification, assessment, and mitigation of risks related to information security.

  • Content: Describes risk assessment methodologies and how risks are prioritized and treated.

4. Incident Response Policy

  • SOC 2 Criteria: CC7.4

  • Purpose: Ensures a structured response to security incidents.

  • Content: Outlines procedures for detecting, responding to, and recovering from security incidents.

5. Data Encryption Policy (Operational Controls?)

  • SOC 2 Criteria: CC6.8

  • Purpose: Defines the use of encryption to protect data in transit and at rest.

  • Content: Specifies encryption standards and methods for safeguarding sensitive information.

6. Business Continuity and Disaster Recovery Policy

  • SOC 2 Criteria: CC9.2

  • Purpose: Ensures that critical business functions can continue during and after a disruptive event.

  • Content: Describes backup procedures, recovery timelines, and disaster recovery processes.

7. Vendor Management Policy

  • SOC 2 Criteria: CC3.3, CC9.2

  • Purpose: Manages third-party risk by ensuring vendors comply with security requirements.

  • Content: Includes due diligence processes, ongoing monitoring, and contractual security requirements for vendors.

8. Change Management Policy

  • SOC 2 Criteria: CC8.1

  • Purpose: Ensures that changes to systems, applications, and processes are controlled and do not negatively impact security.

  • Content: Describes procedures for requesting, reviewing, approving, and implementing changes.

9. Monitoring and Logging Policy (Operational Controls?)

  • SOC 2 Criteria: CC7.1, CC7.2

  • Purpose: Monitors security events and logs system activities for security-related insights.

  • Content: Outlines logging requirements, retention policies, and procedures for monitoring security threats.

10. Human Resources Security Policy

  • SOC 2 Criteria: CC5.1, CC5.2

  • Purpose: Manages security during hiring, employment, and termination.

  • Content: Includes background checks, security training, and termination procedures to ensure ongoing compliance with security requirements.

11. Data Retention and Disposal Policy

  • SOC 2 Criteria: CC8.1, CC8.2

  • Purpose: Ensures that data is stored and destroyed securely according to the organization’s data retention guidelines.

  • Content: Specifies how long data is retained, where it is stored, and how it is securely destroyed.

12. Confidentiality Policy (Access Control?)

  • SOC 2 Criteria: Confidentiality (C1.1)

  • Purpose: Protects sensitive information from unauthorized access or disclosure.

  • Content: Defines what constitutes confidential information and how it should be handled and stored.

13. Privacy Policy

  • SOC 2 Criteria: Privacy (P1.1)

  • Purpose: Establishes guidelines for handling personal data in compliance with privacy regulations.

  • Content: Describes how personal information is collected, used, and protected, along with user rights to access, correct, and delete their data.

14. System Availability Policy (DR/BC Policy?)

  • SOC 2 Criteria: Availability (A1.2)

  • Purpose: Ensures that systems are available to users as per contractual or service level agreements (SLAs).

  • Content: Includes processes for uptime monitoring, system redundancy, and capacity planning.

15. Password and Authentication Policy (Access Control)

  • SOC 2 Criteria: CC6.2

  • Purpose: Protects access to systems through strong password policies and multi-factor authentication.

  • Content: Defines password complexity, rotation schedules, and authentication methods like multi-factor authentication (MFA).

These policies are essential for aligning with the SOC 2 Trust Services Criteria and ensuring that an organization's information security practices are robust, effective, and trustworthy.

4.5 ISO27001

Requires policies for the control domains, and defines the requirement for establishing and maintaining information security policies, but I don’t think it has a pyramid.

Policy Name

ISO 27001 Clause/Annex A Control

Information Security Policy

Clause 5.2, Annex A.5

Risk Management Policy

Clause 6.1, Annex A.8

Access Control Policy

Annex A.9

Incident Management Policy

Annex A.16

Business Continuity and Disaster Recovery Policy

Clause 6.3, Annex A.17

Physical Security Policy

Annex A.11

Asset Management Policy

Annex A.8

Supplier Security Policy

Annex A.15

Cryptographic Controls Policy

Annex A.10

Human Resources Security Policy

Annex A.7

Acceptable Use Policy

Annex A.9

Data Classification and Handling Policy

Annex A.8

Compliance Policy

Clause 4.2, Annex A.18

Change Management Policy

Annex A.12

Network Security Policy

Annex A.13

To comply with ISO 27001, an organization needs to establish several key policies that form the foundation of an Information Security Management System (ISMS). These policies guide the implementation, operation, monitoring, and continual improvement of information security. Below are the essential policies required for ISO 27001 certification:

1. Information Security Policy

  • Purpose: Establishes the overall approach to managing information security.

  • Content: Includes the organization’s objectives, security goals, and management's commitment to ensuring confidentiality, integrity, and availability of information.

2. Risk Management Policy

  • Purpose: Guides how the organization identifies, assesses, and mitigates risks.

  • Content: Specifies risk assessment methodologies, risk appetite, and risk treatment options, ensuring that risks are continuously monitored and managed.

3. Access Control Policy

  • Purpose: Ensures proper access to information systems and data.

  • Content: Defines rules for user access management, user responsibilities, and privileged access controls to protect information from unauthorized access.

4. Incident Management Policy

  • Purpose: Outlines the process for identifying, reporting, and managing security incidents.

  • Content: Includes procedures for incident detection, response, escalation, and remediation.

5. Business Continuity and Disaster Recovery Policy

  • Purpose: Ensures that critical business functions are maintained in the event of an incident.

  • Content: Covers plans for disaster recovery, backup processes, and procedures to resume operations during and after a disruption.

6. Physical Security Policy

  • Purpose: Protects physical assets such as buildings, hardware, and other infrastructure.

  • Content: Specifies controls to limit physical access to sensitive areas, use of security guards, surveillance, and protection from environmental risks (fire, floods, etc.).

7. Asset Management Policy

  • Purpose: Ensures proper management of all company assets (physical and digital).

  • Content: Covers identification, classification, ownership, and protection of assets, ensuring they are used and managed securely.

8. Supplier Security Policy

  • Purpose: Ensures that third-party suppliers and partners comply with information security standards.

  • Content: Specifies the security requirements for suppliers, ensuring their processes align with the organization’s information security policies.

9. Cryptographic Controls Policy

  • Purpose: Manages the use of cryptographic techniques for data protection.

  • Content: Defines how encryption should be applied to protect sensitive information, both in transit and at rest.

10. Human Resources Security Policy

  • Purpose: Manages security during hiring, employment, and termination processes.

  • Content: Includes procedures for employee background checks, confidentiality agreements, and ongoing security awareness training.

11. Acceptable Use Policy

  • Purpose: Establishes guidelines for the appropriate use of company resources (like IT systems, networks, etc.).

  • Content: Defines acceptable and prohibited activities for employees when using the organization’s systems and devices.

12. Data Classification and Handling Policy

  • Purpose: Ensures that information is appropriately classified and handled based on its sensitivity.

  • Content: Defines the categories for classifying data (e.g., public, internal, confidential) and the rules for handling, storing, and transmitting each category.

13. Compliance Policy

  • Purpose: Ensures the organization meets legal, regulatory, and contractual security requirements.

  • Content: Outlines compliance responsibilities and ensures regular audits to confirm adherence to relevant laws and regulations.

14. Change Management Policy

  • Purpose: Manages changes to IT systems and processes without compromising security.

  • Content: Defines procedures for requesting, approving, and documenting changes to the organization's information systems.

15. Network Security Policy

  • Purpose: Protects the organization’s network infrastructure.

  • Content: Includes guidelines for managing firewalls, VPNs, and network access controls to ensure network security.

5. đź“ť What are the Best Templates and Examples?

5.1 SANS (Policy Heavy - what about Standards?)

Policy Heavy - What about Standards? Procedures

Policy

  • Acceptable Encryption Policy

  • Acceptable Use Policy

  • Acquisition Assessment Policy

  • Analog/ISDN Line Security Policy

  • Artificial Intelligence Policy

  • Automatically Forwarded Email Policy

  • Bluetooth Baseline Requirements Policy

  • Communications Equipment Policy

  • Data Breach Response Policy

  • Database Credentials Policy

  • Dial In Access Policy

  • Digital Signature Acceptance Policy

  • Disaster Recovery Plan Policy

  • DMZ Lab Security Policy

  • Email Policy

  • Email Retention Policy

  • Employee Internet Use Monitoring and Filtering Policy

  • Ethics Policy

  • Extranet Policy

  • Internet DMZ Equipment Policy

  • Internet Usage Policy

  • Lab Anti Virus Policy

  • Lab Security Policy

  • Mobile Device Encryption Policy

  • Mobile Employee Endpoint Responsibility Policy

  • Pandemic Response Planning Policy

  • Password Protection Policy

  • Personal Communication Devices and Voicemail Policy

  • Remote Access Policy

  • Remote Access Tools Policy

  • Removable Media Policy

  • Risk Assessment Policy

  • Router and Switch Security Policy

  • Security Response Plan Policy

  • Server Audit Policy

  • Server Malware Protection Policy

  • Server Security Policy

  • Social Engineering Awareness Policy

  • Software Installation Policy

  • Technology Equipment Disposal Policy

  • Virtual Private Network Policy

  • Web Application Security Policy

  • Wireless Communication Policy

  • Workstation Security (For HIPAA) Policy

Standard

  • Information Logging Standard

  • Wireless Communication Standard

Guideline

  • Anti-Virus Guidelines

  • Password Construction Guidelines

Procedure

  • Cyber Security Incident Communication Log

  • Cyber Security Incident Form Checklist

  • Cyber Security Incident Initial System Triage

  • Cyber Security Incident Recovery

  • End User Encryption Key Protection Plan

  • Incident Handling - Chain Of Custody Form

  • Incident Handling Forms - Cyber Security Incident Containment

  • Incident Handling Forms - Cyber Security Incident Response Contact Details

  • Incident Handling Forms - Cyber Security Incident Response Incident Summary

  • Intellectual Property Incident Handling Forms - Incident Communication Log

  • Intellectual Property Incident Handling Forms - Incident Contact List

  • Intellectual Property Incident Handling Forms - Incident Containment

  • Intellectual Property Incident Handling Forms - Incident Form Checklist

  • Intellectual Property Incident Handling Forms - Incident Identification

  • Intellectual Property Incident Handling Forms - Incident Recovery

  • Remote Access Mobile Computing Storage

5.2 GitLab