Creating And Communicating A Security Strategy ✓ Solved
Creating and Communicating a Security Strategy
As an IT professional, you’ll often be required to communicate policies, standards, and practices in the workplace. For this assignment, you’ll practice this important task by taking on the role of an IT professional charged with creating a memo to communicate your company’s new security strategy.
Review the essential elements of a security strategy, including policies, standards, and practices, understanding their roles and interrelations. Describe the business environment of a company within a shopping mall, including relevant details that influence your security policies, such as mobile device usage, email access, and security risks.
Research sample policies and best practices used in the industry, without copying, but learning from them to guide your policy development. Based on this research and your understanding of your business environment, create a comprehensive security strategy in the form of a company memo (3-5 pages). The memo should include:
- A description of the business environment, identifying relevant risks and providing supporting reasoning.
- A security policy or policies tailored to the business, outlining how they support business goals.
- Standards that detail the specific requirements related to the policies.
- Practices that describe steps to enforce and implement these policies and standards effectively.
Format your assignment according to the Strayer Writing Standards (SWS) and ensure your content demonstrates clear organization, professionalism, and business formatting. Your work should be original, well-researched, and thoroughly address each component of the assignment.
Paper For Above Instructions
Creating a comprehensive security strategy is vital for safeguarding organizational assets, especially for a newly established business located within a shopping mall setting. This paper details the process of analyzing the business environment, developing tailored security policies, standards, and practices, all articulated through a professional memo format, aligned with industry best practices and scholarly resources.
Business Environment and Risk Analysis
The hypothetical company operating within a shopping mall presents a unique environment characterized by high foot traffic, diverse customer interactions, and shared physical space. These factors influence security considerations significantly. The company may be a retail store, a service provider, or an entertainment venue, which dictates specific security concerns.
Organizations within malls are exposed to multiple risks including theft, unauthorized access, data breaches, and physical vandalism. The presence of mobile devices among employees and customers introduces vulnerabilities like data leakage and unauthorized remote access. The open environment increases risks of theft of tangible assets, while the potential for cyber attacks escalates with open Wi-Fi networks and mobile connectivity.
The reasoning for developing a security strategy stems from these vulnerabilities, the desire to comply with legal standards such as PCI DSS for payment data, and the need to protect customer and corporate data. The strategic aim is to mitigate risks through a layered security approach, encompassing physical, administrative, and technical controls.
Security Policy Framework
The core security policy for this retail environment emphasizes safeguarding customer data, ensuring secure network access, and protecting physical assets. An example policy statement might be: "All organizational information assets shall be protected against unauthorized access, modification, or destruction, consistent with operational requirements."
This overarching policy is supported by specific policies addressing password management, physical security, mobile device usage, and incident response. These policies align with industry standards such as ISO/IEC 27001 and NIST cybersecurity frameworks, adapted to the company’s operational context.
Standards Development
Standards operationalize policies by establishing specific, measurable requirements. For instance, password standards specify that passwords must be at least twelve characters long, include uppercase and lowercase letters, numbers, and special characters, and are changed every 90 days. Network security standards might dictate the use of WPA3 encryption, VPN use for remote access, and regular patching schedules.
Physical security standards include controlled access to server rooms, surveillance camera coverage, and visitor logs. The standards ensure consistency and compliance across all security measures and are aligned with ISO or NIST guidelines, tailored for the retail environment.
Practices Implementation
Practices operationalize standards through specific steps. Examples include: creating strong passwords per standards, reporting suspicious activities promptly, and conducting regular employee security awareness training. Physical security practices involve procedures for handling access rights, visitor sign-in protocols, and daily security audits.
In the context of mobile device management, practices include enabling device encryption, remote wipe capabilities, and enforceable BYOD policies. Incident response practices detail the timelines and responsibilities for reporting and investigating security breaches, ensuring organizational resilience.
Conclusion
This security strategy combines industry best practices with an understanding of the retail environment within a mall context. It aims to establish a resilient security posture that protects both tangible and intangible assets while supporting business objectives such as customer trust, regulatory compliance, and operational continuity. Regular review and update of policies, standards, and practices are essential to adapt to emerging threats and technological developments.
References
- ISO/IEC 27001:2013. Information technology — Security techniques — Information security management systems — Requirements.
- National Institute of Standards and Technology (NIST). (2020). Framework for Improving Critical Infrastructure Cybersecurity. NIST
- Omanda, J. (2018). Best practices for retail security. Journal of Retail Security, 23(4), 55-62.
- Schneier, B. (2015). Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Company.
- Stallings, W. (2017). Cryptography and Network Security: Principles and Practice. Pearson.
- U.S. Department of Homeland Security. (2019). Physical Security Guidelines for Critical Infrastructure.
- Whitman, M. E., & Mattord, H. J. (2018). Principles of Information Security. Cengage Learning.
- National Security Agency (NSA). (2010). Information Assurance Directorate Policies and Procedures.
- Microsoft. (2022). Password Security Best Practices. Microsoft Security White Paper.
- ISO/IEC 27002:2013. Information technology — Security techniques — Code of practice for information security controls.