Security Policies and
Implementation Issues
Lesson 4
User Policies
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company
www.jblearning.com
All rights reserved.
Learning Objective
• Describe the different information
systems security (ISS) policies associated
with the User Domain.
Key Concepts
• Reasons for governing users with policies
• Regular and privileged users
• Acceptable use policy (AUP) and
privileged-level access agreement (PAA)
• Security awareness policy (SAP)
• Differences between public and private
User Domain policies
Security Awareness Policy (SAP)
• Addresses:
• Basic principles of information security
• Awareness of risk and threats
• Dealing with unexpected risk
• Reporting suspicious activity, incidents,
and breaches
• Building a culture that is security and
risk aware
Acceptable Use Policy (AUP)
• Attempts to protect an organization's computers and
network
• Addresses password management
• Addresses software licenses
• Addresses intellectual property management
• Describes e-mail etiquette
• Describes the level of privacy an individual should
expect when using an organization's computer or
network
• Describes noncompliance consequences
Privileged-Level Access Agreement
(PAA)
• Acknowledges the risk associated with elevated
access in the event the credentials are breached or
abused
• Asks user to promise to use access only for approved
organization business
• Asks user to promise not to attempt to “hack” or
breach security
• Asks user to promise to protect any output from
these credentials such as reports, logs, files, and
downloads
Different types of Users within an
Organization
Example of User Types
User-Access Requirements
Who Develops User Policies
• Chief financial officer (CFO)
• Chief operations officer (COO)
• Information security manager
• IT manager
• Marketing and sales manager
• Unit manager
• Materials manager
• Purchasing manager
• Inventory manager
Roles and Responsibilities
Roles and Responsibilities
• Executive Managers
• Responsible for governance and compliance requirements, and funding
and policy support
• Program and Functional Managers
• Responsible for security management, planning, and implementation;
also risk management and contingency planning
• IT Security Program Managers
• Responsible for broad training in security planning, system and
application security management, risk management, and contingency
planning
• Auditors
• Responsible for auditing log files and reviewing policies and
implemented controls.
• All Users
• Responsible for basic security
Differences and Similarities in User
Domain Policies
Differences and Similarities in User
Domain Policies
The User as the Weakest Link in the
Security Chain
The User as the Weakest Link in the
Security Chain