Giter VIP home page Giter VIP logo

sdp-cso's Introduction

Digital Security Policies for CSOs

This framework guides your organization to agree on well-defined objectives for strategy and security of information. A set of digital security policies aimed to help you improve your digital safety and resiliency, and also promote digital rights and privacy for all, in Jordan and around the globe.

Information security focuses on three main objectives:

  • Confidentiality — considers proper authorization to access and use assets
  • Integrity — considers data integrity and identity authenticity
  • Availability — considers ease of access to information or systems when necessary

Grouped and categorized you will find a set of policies that you may use as a basis to develop your own tailored set of policies.

A Digital Security Policy or Policy in this context identifies the rules and procedures for all individuals accessing and using an organization's IT assets and resources. Effective security is ensured by deploying and enforcing of such policies in the workplace and for all employees.

Every Policy consists of four different sections:

  • Objectives - what the policy aims to accomplish?
  • Scope - who, what, and when this policy applies.
  • Goals - list of goals needed to accomplish our desired aims.
  • Compliance - list of responsibilities for compliance and actions to be taken in the event of noncompliance.

Free use disclaimer This policy was created by the Jordan Open Source Association (JOSA) for the Internet community.
All or parts of this framework can be freely used for your organization.
There is no prior approval required.

?> Looking to contribute? Read the contribution guide.

About JOSA

The Jordan Open Source Association (JOSA) is a non-profit organization based in Amman, Jordan. The association is among few non-profit organizations registered with the Jordan Ministry of Digital Economy and Entrepreneurship.

JOSA’s mission is to promote open source principles for the good of Jordanian society. We believe that information that is non-personal – whether it’s software code, hardware design blueprints, data, network protocols and architecture, content – should be free for everyone to view, use, share, and modify. Our belief also holds that information that is personal should be protected within legal and technological frameworks. Access to the modern Web should likewise remain open.

Revisions

Revision Description Date Tag
1.11 The initial revision 07/03/2022 TID
1.22 The initial revision 20/04/2022 TID

Notation

To better reference policies in this document we used a simple notation system to help you out.

Every policy is denoted as x.y.z where:

  • x is the category of the digital policy
  • y is the the group of policies in that category
  • z is the the number of that policy in that group

C1.2.3 P3.4.17

Categories of Digital Policies

The standard digital policies vary depending on the security category they belong to.

The categories are as follows:

1. Physical Security

Overview

Physical security is what describes security measures that are designed to deny unauthorized access to facilities, equipment, and resources and to protect personnel and property from damage or harm[1].

Physical security systems for protected facilities are generally intended to:

  • deter potential intruders.
  • detect intrusions and monitor/record intruders.
  • trigger appropriate incident responses.
  • physical security can be affected by multiple procedures and standards,

this includes but is not limited to:

Policies

1.1 Travel Policy

Objectives

This policy aims to:

  • Ensures the safety of the organization’s assets when subjected to remote reach.
  • Ensures the occurrence of routine operations, assets, and risk management system
  • Ensures you have the proper data backup and recovery plan needed.
Scope

This policy applies to:

  • your employees
  • any external contractors
Conditions

?> 1.1.1 - Specific risks of a destination should be assessed in advance and adequate measures need to be in place in case of necessity. Otherwise, the travel should not be undertaken.

?> 1.1.2 - The organization will enable all employees and experts to prepare themselves by means of adequate instructions regarding travel safety and security.

?> 1.1.3 - For all business trips, all operational updates, and operations that occur with the employee or contracted individual should be sent to a separate document - accessed by only authorized and concerned parties- in case of emergencies. In this document all the trip’s updates, operations details will be stored.

  • 1.1.4 - When a situation occurs abroad where staff or contracted individuals are not available, the organization’s ethical committee should be able to provide at short notice guidance or take a decision on the matter prioritizing action based on the gravity of the consequences.
  • 1.1.5 - The information security offices will be responsible for monitoring the implementation of the Travel Security Policy and its regular review.
  • 1.1.6 - All security incidents or near-incidents should be reported by the employee, the contracted individual, or their manager to the officer and the ethical committee. The Board will then discuss the follow-up and actions needed.

The purpose of this Travel Policy is to ensure the safety of the organization’s assets when subjected to remote reach. This policy covers all the procedures of personnel or contracted individuals and how it reflects on the organization’s routine operations, assets, and risk management system, and the recovery plan needed.

Policy Compliance

!> Compliance Measurement, the InfoSec team will verify compliance to this policy through various methods, including but not limited to, periodic check-ups and internal audits, and feedback.

Exceptions, any exception to the policy must be approved by the ethical committee or the board in advance.

1.2 - BYOD Policy

1.3 - Threat and Harassment Policy

1.4 - On/Off Boarding Policy

1.5 - Clean Disk Policy

1.6 - Removable Media Policy

2. Social Media Security Policy

Overview

Social media security is specifically concerned with the protection of social platforms’ accounts, credentials, data, and personals. Attackers often use social media accounts during the reconnaissance phase of a social engineering or phishing attack. Social media can give attackers a platform to impersonate trusted people and is subjected to hacking, any type of compromisation, and/or data breach. Platforms such as but not limited to Facebook, Twitter, WhatsApp, Instagram, etc.

The purpose of a social media security strategy is to give people the ability to do what's needed without compromising security and by maintaining the “Least Priviledge” principle.

Social media security can be affected by multiple procedures and standards, this includes but is not limited to:

Policies

Social Media Account Verification Policy

Purpose
Scope
Policy
Policy Compliance

Social Media Authorities Policy

3. Email Policy

Overview

Policies

4. Crises Operation Policy

Overview

Policies

5. Communication

Overview

Policies

6. Account Security

Overview

Policies

Resources

Contributing

Glossary

Term Definition
Confidentiality Confidentiality involves the protection of assets from unauthorized entities
Integrity Integrity ensures the modification of assets is handled in a specified and authorized manner
Availability Availability is a state of the system in which authorized users have continuous access to said assets

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.