|
---|
Table of Contents |
---|
outline | true |
---|
style | none |
---|
type | list |
---|
|
|
- Everyone has a responsibility to protect information and individuals are held accountable..
- Information must not be stored without understanding and formally mitigating or accepting the risk.
- Defense In Depth
- Least Privilege Access
- Network Segmentation
- Segregation of Duties
- Simplicity
Information Security decision making is guided by documented policies. See more: Information Security and Privacy Policies Information Security roles must be formally defined and individuals must be assigned to fulfill those roles. See more: Roles and Responsibilities Data must be formally inventoried and assigned a risk classification. See more: Data Classification The critical component to implenting information security is performing risk assessment on all information and infrastructure assets. See more: Risk Management and Privacy PoliciesInformation Security and Privacy Policies Each risk classification has a baseline of controls for risk mitigation. These controls must be modified based on individual system risks. See more: Information Security Controls |