RE: Security policy



Hi Francois,

This book helps to me a lot:

"Information Security Architecture: An Integrated Approach to Security
in the Organization"
by Jan Killmeyer Tudor

It's available at Amazon.Com and more.

Best regards,

--
Luislo

-----Original Message-----
From: listbounce@xxxxxxxxxxxxxxxxx [mailto:listbounce@xxxxxxxxxxxxxxxxx]
On Behalf Of Francois Yang
Sent: martes, 24 de octubre de 2006 23:39
To: security-basics@xxxxxxxxxxxxxxxxxxxxxxx
Subject: Security policy

Can anyone please point me in the right direction.
I need to write some security policies, but I'm not sure where to begin.
I know there are alot of examples and templates out there, but what do I
include in the policy.
I see seperated policies for e-mail, password, remote access, acceptable
use, etc...but I was also told that it is better to try to make all of
those fit into one so that we don't have to keep track of 10 different
policies. The question is, which one do I include in one big security
policy and which ones to I make them seperate?

thank you.

------------------------------------------------------------------------
---
This list is sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The NSA has
designated Norwich University a center of Academic Excellence in
Information Security. Our program offers unparalleled Infosec management
education and the case study affords you unmatched consulting
experience.
Using interactive e-Learning technology, you can earn this esteemed
degree, without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus
------------------------------------------------------------------------
---



------------------------------------------------------------------
This e-mail and the documents attached are confidential and intended solely
for the addressee; it may also be privileged. If you receive this e-mail
in error, please notify the sender immediately and destroy it.
As its integrity cannot be secured on the Internet, the Atos Origin group
liability cannot be triggered for the message content. Although the
sender endeavours to maintain a computer virus-free network, the sender does
not warrant that this transmission is virus-free and will not be liable for
any damages resulting from any virus transmitted.

Este mensaje y los ficheros adjuntos pueden contener informacion
confidencial destinada solamente a la(s) persona(s) mencionadas
anteriormente. Pueden estar protegidos por secreto profesional Si usted
recibe este correo electronico por error, gracias de informar inmediatamente
al remitente y destruir el mensaje.
Al no estar asegurada la integridad de este mensaje sobre la red, Atos
Origin no se hace responsable por su contenido. Su contenido no constituye
ningun compromiso para el grupo Atos Origin, salvo ratificacion escrita por
ambas partes.
Aunque se esfuerza al maximo por mantener su red libre de virus, el emisor
no puede garantizar nada al respecto y no sera responsable de cualesquiera
danos que puedan resultar de una transmision de virus
------------------------------------------------------------------

---------------------------------------------------------------------------
This list is sponsored by: Norwich University

EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE
The NSA has designated Norwich University a center of Academic Excellence
in Information Security. Our program offers unparalleled Infosec management
education and the case study affords you unmatched consulting experience.
Using interactive e-Learning technology, you can earn this esteemed degree,
without disrupting your career or home life.

http://www.msia.norwich.edu/secfocus
---------------------------------------------------------------------------



Relevant Pages

  • [PATCH v3 03/15] evm: re-release
    ... EVM protects a file's security extended attributes against integrity ... new file mode 100644 ...
    (Linux-Kernel)
  • [PATCH 04/15] evm: re-release
    ... EVM protects a file's security extended attributes against integrity ... * Calculate the HMAC for the given dentry and verify it ...
    (Linux-Kernel)
  • [PATCH v2 03/14] evm: re-release
    ... EVM protects a file's security extended attributes against integrity ... new file mode 100644 ...
    (Linux-Kernel)
  • Re: [TOMOYO #7 30/30] Hooks for SAKURA and TOMOYO.
    ... I think some might argue that the integrity of the data in /etc/shadow ... and was not security relevent. ... ultimately data integrity requires information flow control to preserve. ... being used on every file on a multiple pedabyte filesystem. ...
    (Linux-Kernel)
  • Re: Patching
    ... Security is availability, ... confidentiality and integrity, isn't it? ... to behave incorrectly from a security perspective. ... revision X.x with applications Y.y and disk/tape drivers at revision Z.z. ...
    (Security-Basics)