IT Examiner School
Program Implementation Chief Information Security Officers
Should report directly to the Board or senior management. Should be risk managers and not an IT resource. Prevent conflicts of interest.
47
Program Implementation Policy, Standards & Procedures
• Policy : All external business communication via the Internet will provide confidentiality, integrity, and availability. • Standards : We will use an FIPS 140-3 encryption for IPSec VPN with key exchange via IKE using RSA digital certificates. • Procedures : Configure Cisco 3620 with IPSec using AES128 encryption to host…
Policy
Standards
Procedures
Made with FlippingBook Digital Publishing Software