Organizational Culture
The culture of an organization and its service provider is the most important factor that determines the implementation of an information security program. An organization's culture influences its risk appetite, that is, its willingness to take risks. This will have a significant influence on the design and implementation of the information security program. A culture that favors taking risks will have a different implementation approach compared to a culture that is risk averse.
Cultural differences and their impact on data security are generally not considered during security reviews. Different cultures have different perspectives on what information is considered sensitive and how it should be handled. This cultural practice may not be consistent with an organization's requirements.
For some organizations, financial data is more important than privacy data. So, it is important to determine whether the culture of the service provider is aligned with the culture of the organization. Cultural differences and their impact on data security are generally not considered during security reviews.
Acceptable Usage Policy
An acceptable usage policy (AUP) generally includes rules for access controls, information classification, incident reporting requirements, confidentiality requirements, email, and internet usage requirements. All participants must understand which behaviors and acts are acceptable and which are not. This maintains a risk-aware culture.
A well-defined and documented AUP helps spread awareness about the dos and don'ts of information security.
It is essential that the AUP is conveyed to all users, and acknowledgment should be obtained from the users that they have read and understood the AUP. For new users, an AUP should be part of their induction training.
Ethics Training
The information security manager should also consider implementing periodic training on ethics. Ethical training includes emphasizing moral principles that govern a person's behavior or the conduct of an activity. It includes guidance on what the company considers legal and appropriate behavior.
Training on ethics is of utmost importance for employees engaged in sensitive activities, such as monitoring user activities or accessing sensitive personal data.
Some examples of unethical behavior include improper influence on other employees or service providers, use of corporate information or assets for private benefit, accepting gifts or bribes, and multiple employments.
Acknowledgment should be obtained from employees on understanding ethical behavior and the code of conduct and this should be retained as part of the employment records.
Practice Question Set 2
- A newly appointed information security manager is reviewing the design and implementation of the information security program. Which of the following elements will have a major influence on the design and implementation of the information security program?
- Types of vulnerabilities
- The culture of the organization
- The business objectives
- The complexity of the business
- Which of the following is the most important factor to consider while developing a control policy?
- Protecting data
- Protecting life
- Protecting the business's reputation
- Protecting the business objectives
- Which of the following risks is most likely to be ignored during an onsite inspection of an offshore service provider?
- Cultural differences
- Security controls
- The network security
- The documented IT policy
- What does an organization's risk appetite mostly depend on?
- The threat landscape
- The size of the information security team
- The security strategy
- The organization's culture
- What factor has the greatest impact on the security strategy?
- IT technology
- System vulnerabilities
- Network bandwidth
- Organizational goals
- What is the most important consideration when designing a security policy for a multi-national organization operating in different countries?
- The cost of implementation
- The level of security awareness of the employees
- The cultures of the different countries
- The capability of the security tools
- What is the most important factor in determining the acceptable level of organizational standards?
- The current level of vulnerability
- The risk appetite of the organization
- IT policies and processes
- The documented strategy
- What is the most important factor for promoting a positive information security culture?
- Monitoring by an audit committee
- High budgets for security initiatives
- Collaboration across business lines
- Frequent information security audits