Information Security
- Overview
- Guidance, Documents & Policies
- Key Topics
- Info/Cyber Security Checklist
- Examples & Advice
- Short videos
- FAQs
- Ask a Question
This section on information security provides our initial documents to support the information security programme.
Data Protection often looks at the security and legalities of personal data, information security looks at more practical steps to secure all data in your organisation - in reality, the two things are intrinsically linked and the DPE data protection framework utilised many approaches from information security frameworks.
The documents include:
- Cyber Essentials Guidance
- Business Continuity Template
- Information Security Policy
- Physical Security Policy
- Changing IT Provider Considerations
Whilst Cyber Essentials is a recommended framework, you may find it not right for you - however, the areas covered are those that your organisation needs to pay attention to, so it is worth reviewing.
For a complete Information Security programme, other resources and tools are necessary, as well as strategic coordination with your information technology and facilities specialists. However, it is important to remember that accountability and governance is the responsibility of leadership and practical security and data protection is everyone's responsibility.
Other policies and tools should be used as part of your information security programme and these are an important part of a data protection programme. These include:
- Clear desk policies
- Record of processing (supplier, systems and hardware due diligence)
- Retention schedules
- Records management
- Risk management
- Bring your own device
- Acceptable use
- Password Management
- User Access Control
- etc.
Nothing should be taken in isolation. These tools and resources all work together. This best practice area should be reviewed with the Cyber Security Best Practice Area.
Risk assessment is a key factor in information governance. We have therefore provided a new e-learning module on risk assessment.
Strong Password Policies: Enforce the use of complex passwords and regular updates.
Multi-Factor Authentication (MFA): Require MFA for all sensitive systems.
Role-Based Access Control (RBAC): Limit access to systems and data based on roles and responsibilities.
Principle of Least Privilege: Ensure users have the minimum level of access necessary to perform their job.
Access control also includes physical access to the building as well as systems, devices and software. Review the CCTV best practice area for information about surveillance. Visitor management systems can help with non-employee access to the buildings.
Cloud security is often managed by a third party, so ensure they understand your role based procedures and policies.