Asset Identification and Classification Policy

2977 Words6 Pages

Asset Identification & Classification Policy

Policy Definition
It is the goal of this organization to implement the policies necessary to achieve the appropriate level of protection for each corporate asset.

Standard
Protecting each asset requires collaboration from every employee. Different assets have a different probability of failure do to vulnerabilities, threats and require annual information security training for each employee.

Procedure
A true security program includes an Asset Identification & Classification Policies, therefore, identifying and categorizing, tracking and managing assets require one to create and implement an inventory control list according to the recommendation outline in NIST 800-53 Rev. 4 Security and Privacy Controls for Federal Information Systems and Organization.

Guideline

The classification of assets in accordance business need in the event of disaster is critical to this organization, therefore the classification scheme require the approval of the Chief Information Officer and the head of building security.

This assessment/classification of assets must include the following parameters:

• Identifying the type of asset including (network components, devices (laptops, workstations, servers, routers, and data)
• Rating of each asset identified
• Data classification o Based on roles and responsibility and access privileges

It is imperative to conduct an annual assessment management.

Asset Management and Protection Policy
Policy Definition
Today an organization has must take every precaution to manage and protection their assets including its offshore, physical, and IT Infrastructure assets. The need for Asset Management and Protection is a harsh reality and by design will not only ...

... middle of paper ...

...the marketplace, increase profit, and comply with both external and internal policies and procedures, including federal laws and regulations. It is imperative before an organization begins to discuss, design or implement policies a clear understanding of hardening and the benefits of a layered defense at key “point on the network (public and private), at the server, and at the desktop. Policies written by an organization, which encompasses guidelines or mandates from a government entity are therefore ensure a layered approach.

Reference
SANS Institute. (2003). Global Information Assurance Certification Paper. Retrieved from http://www.giac.org/paper/gsec/3908/layered-security-model-osi-information-security/106272
SANS Institute. (2003). Global Information Assurance Certification Paper. Retrieved from http://www.giac.org/paper/gsec/2599/layered-security/104465

Open Document