IT Examiner School - Oct 2025

Internal Use Only

Policy Framework: What are Procedures? Procedures define in detail how a policy and its supporting standards and guidelines shall be implemented as a security control in a particular operating environment. Simplistic example

Procedures: Detailed steps for

Policy: Access to company information systems is restricted to authorized users only.

accomplishing the following in Microsoft Active Directory (a technical security control) • Require users to have a unique login id • Require user passwords to be eight or more characters in length

Standard: Users are required to have a unique User ID and a confidential password.

Guidelines: Passwords should be 8 or more alpha numeric characters in length

11

These materials are for internal training purposes for NYS DFS Staff. It may not be distributed outside the department.

Internal Use Only

Elements of a Good Information Security Framework

Board & Executive Oversight

Supports the mission of the organization

Requires a comprehensive and integrated approach

Protect assets of the Organization

Protections are implemented based on risk informed decision making

Interdependencies of security controls are assessed and monitored

Cultural adoption through awareness & skills training

Roles and Responsibilities are explicit

Made with FlippingBook Learn more on our blog