S 2.192 Drawing up a policy for information security

Initiation responsibility: Top Management

Implementation responsibility: Top Management, IT Security Officer

The guiding statements of the security strategy should be summarised in a policy for information security so that all employees have documentation of the security objectives to be pursued and the security level to be obtained. The security policy can be considered visible confirmation of top management's responsibility for information security.

The following points must be taken into account when drawing up the policy for information security:

Responsibility of top management

It is important for top management to be fully behind the policy for information security as well as behind the goals stated in the policy. For this reason, the security policy must be signed by top management and published in its name. Even when individual tasks are delegated to persons or organisational units in the framework of the security process, the overall responsibility for information security still remains with top management.

Specification of the scope

The information security policy must state which areas it applies to. The scope may include the whole organisation or just parts of the organisation. It is important, though, for the scope to include all specialised tasks and business processes examined.

Specification of the security objectives

At the beginning of the security process, top management must define, agree on, and document the security objectives. The security objectives can be derived from the business processes and specialised tasks, legal framework, and general objectives of the government agency or company. The security objectives serve as the foundation for the creation of the information security policy.

Content of the security policy

The policy for information security should be formulated clearly and concisely because experience has shown that policy papers containing more than 20 pages will not be successful in actual practice. The policy should contain the following aspects at a minimum, though:

Releasing the policy for information security

Experience has shown that security safeguards and organisational regulations will only be complied with by the employees when they are able to recognise their purpose. For this reason, the security policy must be published in order to document the strategy of the people in management who are responsible for it. This should be documented so that the value of information security is clear to all. It is important for all employees to be familiar with and understand the contents of the security policy. New employees should be informed of the policy for information security before they are allowed to access business-related information. Having all employees confirm in writing that they are familiar with the security policy will underscore the importance of the policy. In general, the policy for information security should be stated generally enough so that all employees from the various organisational units of the organisation are aware of its relevance. However, it is also possible to add sections to the security policy that are confidential or are only relevant to a limited number of people in order to cover special applications or areas in an organisation. It is recommended to move these sections of the policy to an appendix to enable flexible and prompt reactions to any changes necessary without having to adapt the general part of the policy. If necessary, the appendix can be marked as confidential and given special protection.

Updating the security policy

The policy for information security should be checked and updated if necessary at regular intervals. The policy should be updated to reflect changes in the general conditions, business goals, tasks, or security strategy. Due to rapid developments in the field of IT and in the field of security, it is recommended to revise the security policy every two years.

Review questions: