S 2.338 Creating target group oriented security policies

Initiation responsibility: IT Security Officer, Top Management

Implementation responsibility: IT Security Officer

Conveying security topics to the right target groups

An important factor for successfully reaching an adequate level of security is responsible and competent employees who are able to work together in a co-ordinated fashion. Management, IT users, administrators, and security experts all have different qualifications in different areas of expertise and perform different tasks in this context. While the management of the company or government agency bears overall responsibility, sets goals, and defines general conditions, the administrators must be highly qualified technically and possess detailed knowledge in order to operate and securely configure the systems.

Using the IT-Grundschutz Catalogues, the people responsible for security are able to create a comprehensive security concept. The security concept is often many pages long when it is intended to cover all areas of information security. The preparation and communication of the contents of the security concept for specific target groups is an important task of security management. The goal is to ensure that all employees know which security aspects affect them and their area of responsibility and what precautions they should take.

It is therefore recommended to create different security policies or detailed security subconcepts that represent individual security issues as needed. This enables employees to obtain exactly the information they need on a certain subject.

Separate security policies for IT systems or services that are located in an area critical to security, whose configurations are complicated, or that are difficult to use may contain technical instructions for administrators that normal users will not understand. In the documents for the employees, though, the security topics should be prepared appropriately and not contain any unnecessary details.

Hierarchical structure of policies

When formulating the policies, experience has shown that is best to work at different levels.

In the first level, the general security objectives and the security strategy should be formulated briefly and concisely in a policy for information security (see S 2.192 Drawing up an information security policy). The strategy does not contain any technical details and must be approved by management. In the next level, basic technical security requirements should be derived from the strategy designed in the first level.

The general security concept should include documents describing the various aspects of information security (e.g. a policy for using the Internet or a virus protection concept) but should not mention any specific products.

In the third level, technical details, specific safeguards, and product-specific settings are described. This level contains numerous documents that are changed regularly and are usually only read by the experts responsible.

The following figure shows the structure described above graphically.

Hierarchical structure of policies
Figure: Hierarchical structure of policies

Contents of special security policies

The following topics are suitable topics to be handled in special security policies for specific target groups, for example:

Security policy for IT usage

It is recommended in many cases to specify the general objectives of the policy for information security in more detail in a security policy for IT usage and summarise the most important organisation-wide safeguards of the security policy in a guideline that does not contain any technical details and that can be understood by everyone. This guideline describes the basic rules for the use of IT throughout the organisation and guides the employees through the security concept.

The following subjects could be handled in a general security policy for IT usage:

The BSI offers various sample policies and concepts as examples on its web site in the IT-Grundschutz section.

Review questions: