Security Policy – Classification and Control of Resources
Classification and Responsibility for Resources
An inventory of the organisation’s vital and important resources should be kept up to date. It takes the form of a table describing the resource and naming the person or persons in charge. The classification of assets is an extremely important task.
The level of importance of the resource for the company is also specified:
- vital
- important
The following elements are considered resources:
- computers (PCs, laptops, servers, netbooks) and printers;
- communication equipment (modem, switch, router, PABX, fax, etc.);
- files and databases (regardless of the device: disks, USB flash drives, tapes, etc.);
- applications (software);
- documents (contracts, procedures, plans, archives, etc.).
Security Measures:
- file servers
- email servers
- fixed network
- internal Wi-Fi network
- customer Wi-Fi network
- computers connected to the Internet
- laptop computers
Directly Associated Organisational Measures:
Technical Measures:
Inventory of Assets
An inventory of the organisation’s major resources (assets) should be kept up to date. It takes the form of a table describing the resource and naming the person or persons in charge. Each asset should be classified according to confidentiality, integrity and availability requirements.
Elements classified as ‘vital’ are those that could compromise the organisation’s existence if they disappear, are disclosed externally or become defective. Elements considered as ‘important’ are those that could cause serious consequences for the company under the same conditions.
The management and classification of properties are based on the following principles:
- Application to all assets, in other words, anything with value, including information, such as listed in an inventory.
- Determination of a manager for each asset type.
- Ensure the correct use of assets in accordance with the security rules for the different classes.
- Regular review by the manager.
- Classification based on three criteria: confidentiality, integrity and availability.
- Classification depending on impact.
- Confidentiality classification legacy.
- Qualification of contents to simplify management rules.
- Default classification.
- Marking to ensure the security rules are considered when handling assets.
- Use of encryption to ensure that sensitive information is transported in a sufficiently well-protected container.
Which is where the following rules and responsibilities come in:
- Each item must be inventoried and attributed to a manager who is responsible for determining its classification and the security measures to be applied.
- An item that contains other items must have at least the same classification as the most sensitive item it contains.
- Information always has the same classification, regardless of the form in which it is found.
- The security manager is responsible for characterising the contents.
- The security policy and any document contained within it will be inspired by internationally recognised best practice in security management. The best practice is documented in ISO/IEC standards 27001 and 27002.
- An item’s manager must have reached the rank of division manager or his replacement.
- The security manager is responsible for characterising the contents.
- The classification policy is implemented through procedures.
- These procedures and documents are available to all staff.