Part 1: Issue-Specific Security Policies NIST SP 800-12 Rev 1 recommends three types of information security policies to help organizations create, maintain, and develop an effective Information Security Program, with the objective of reducing risks, complying with laws and regulations, assuring operational continuity, and applying informational confidentiality, integrity, and availability. One type is Issue-Specific Security Policies (ISSP). For each of the following issues, use ″NIST SP 800-12 Rev 1,″ located in https://csrc.nist.gov/publications/detail/sp/800-12/rev-1/final , to create an ISSP document. Make sure to address the following for each policy: Issue Statement, Statement of the Organization′s Position, Applicability, Roles and Responsibilities, Compliance, Points of Contact, and Supplementary Information. 1.Use of personal equipment on your company′s network (BYOD) 2.Internet access 3.Personal use of company equipment 4.Removal of organizational equipment from your company′s property 5.Use of unofficial software Part 2: Legal Standard Operating Policies and Procedures A thorough legal standard operating policies and procedures (SOP) document is the foundation of a good business continuity plan. Standard operating procedures and polices provide the roadmap for management and staff to follow. These steps become the backbone of the business continuity plan, and they must govern every aspect of your chosen company. Design a 4-page manual presenting the legal standard operating policies and procedures to describe incidents including fire evacuation, ransomware attack, power outage, and pandemic situations. Each policy or procedure must include information related to: 1.Industry Compliance 2.Business Operations 3.Training and Awareness 4.Disaster Recovery 5.Incident Response Support the BCP with a minimum of three scholarly resources. Part 3: Incident Response Once an adverse event that has targeted a business is confirmed, it is labeled as an incident. That is the time to activate the incident response plan. After the plan is activated, procedures are followed for incident reaction. Most of the time, the incident is contained. Then, clean up of all the problems begins and the organization makes a full recovery, with everything back to normal. This is incident recovery. Use the guidelines provided by ″NIST SP 800-61 Rev. 2 in https://csrc.nist.gov/publications/detail/sp/800-61/rev-2/final : The Computer Security Incident Handling Guide,″ located in the topic Resources, to design an Incident Response Plan (IRP) for your company.
