Securing Your People

Expert Perspective — By on October 30, 2012 at 8:00 am

This article is part five in a twelve-part series on information security fundamentals for small and medium-sized businesses.

In the first article of this series, we discussed the importance of assigning the responsibility of day-to-day information security tasks to a person (or, ideally, to a team of people). But how do you know when you’ve found the right person for the job? An important first step is to document your information security job descriptions.

Jerod Brennen

In my experience, there are three types of information security professionals:

  • • People-oriented
  • • Process-oriented
  • • Technology-oriented

The people-oriented security professional is your security team manager. This is the individual who can speak the language of business and the language of security. This individual will be tasked understanding and driving everything that falls under security organization management.

The process-oriented security professionals are your security “accountants.” These team members have a blend of business skills and technical skills, and they thrive on understanding policies, procedures, standard, and business flows. They will be tasked with risk management, human resources security, business continuity, security incident management, compliance, and policy.

The technology-oriented security professionals are your geeks. These are the system administrators who love rolling up their sleeves and diving into the tech while remaining active in professional groups like ISSA, InfraGard, and OWASP. They will be tasked with physical security (particularly if you have electronic locks and/or access control systems), asset management, security operations, and security systems administration.

Keep in mind that the security professionals you hire are going to have access to some very sensitive information. Come to think of it, chances are that your current HR, finance, and help desk employees already have access to even more sensitive data than the security team ever will.

How do you know that you’re putting trustworthy individuals in these positions?

Background checks are one way to answer that question. A basic background check will verify education, driving, and criminal records. If you need to dive deeper, you can also include items like credit checks and credential verification.

You don’t need to perform background checks for everyone in the organization, but you should definitely perform them for individuals who will access personally identifiable information, electronic protected health information, and/or payment card information.

You can also institute a non-disclosure agreement for both employees and non-employees. Document your definition of sensitive information (as it pertains to your organization), and then set clear expectations around how that data is to be handled.

In addition to being legally binding, NDAs are especially useful when you engage in business with third parties who may not be fully aware of your internal policies.

Speaking of which, security awareness training is another critical HR security control. If you truly want your employees to handle sensitive data properly, teach them how to do so.

Keep in mind that this training doesn’t need to adhere to older models of boring computer-based training modules or all day lectures. You can also offer this training through games, animations, and short online videos.

Remember: your security awareness training should be aligned with your internal policies. An unfortunate necessity for those policies is the inclusion of the phrase “up to and including termination.” At some point, you may need to dismiss an employee for violating company policy.

By documenting your disciplinary procedures ahead of time, you’ll make it a little easier to cross that bridge when you come to it. Remember, though, that enforcing policy violations isn’t about following the rules. It’s about protecting your people and your business.

Although we’ll touch on access management in detail in a future article, there are two critical access management controls that are essential to effective HR security management.

One is to regularly review employee access rights. Make sure that employees with access to sensitive data have gone through the necessary steps to gain that access. Otherwise, you should either remove their access or put them through their paces to legitimately gain access.

The other is to document your access termination procedure. I touched on this subject in a previous article, and I’ll likely mention it again before the end of the series. It’s that important.

To recap, every business owner should do the following:

  • • Document information security job descriptions
  • • Perform background checks
  • • Document a non-disclosure agreement
  • • Provide security awareness training
  • • Document your disciplinary procedures
  • • Regularly review employee access rights
  • • Document your access termination procedure

In the next article, we’ll tackle Physical Security Management.

Jerod Brennen (14 Articles)

By day, Jerod Brennen is a principal security consultant with Jacadis, an award-winning security solutions and services provider. By night, hes a husband, father, writer, filmmaker, martial artist, and social media junkie. Jerod has more than a decade of information technology, infosec, and compliance experience. He spent years as an information security specialist with American Electric Power before moving to Abercrombie & Fitch to build out and manage its information security program. Jerods approach to infosec has two key tenets: don't be afraid to void warranties, and you shouldn't need to bypass security to get your work done. Follow him on Twitter at @slandail.