Task: Develop Security Policies And Procedures
Policies and procedures are the foundational elements of the Information Security And Compliance Framework. These policies are instrumental in driving the security and compliance requirements in the engagement.
Relationships
Main Description

An understanding of security requirements is obtained by analyzing security requirements(contractual), Client’s existing policies and procedures and the Group and local/BU/Region security policies,baselines and standards. Based on these requirements, the security policies for the engagement must be developed. These must also be inline with the security and regulatory standards that the Client must comply with. Procedures and controls must then be developed in order to implement these policies in the engagement.

The procedures and controls would typically include:

  • Procedures and controls for on-boarding and off-boarding of resources
  • Procedures and controls for access provision for different job functions, roles and designations and segregation of duties
  • Procedures and controls for password management
  • Procedures and controls for network security (in terms of firewalls, antivirus etc.that need to be employed)
  • Procedures and controls for data privacy and security (in terms of encryption or data masking or classification that needs to be done)
  • Procedures and controls for export compliance
  • Procedures and controls for mobile security (if applicable)
  • Procedures and controls for media handling (if applicable)
  • Procedures and controls for handling security breaches.

The Information Security And Compliance Lead must seek concurrence with relevant stakeholders viz. Clients risk and compliance SMEs, Independent Security Manager, Client’s compliance cell, Engagement Manager (Services), Service Delivery Teams and information security teams to develop these policies and ensure these are inline with the Clients security and compliance requirements.

More Information
Guidelines