Security Standards & Least Privilege Security Standards Essay

PAGES
2
WORDS
667
Cite

Security Standards & Least Privilege Security Standards and Legislative Mandates

Industries are required by law to follow regulations to protect the privacy of information, do risk assessments, and set policies for internal control measures. Among these polices are: SOX, HIPAA, PCI DSS, and GLBA. Each of these regulations implements internal control of personal information for different industries. Where GLBA is for the way information is shared, all of them are for the safeguard of sensitive personal information.

Sarbanes-Oxley Act of 2002 (SOX) created new standards for corporate accountability in reporting responsibilities, accuracy of financial statements, interaction with auditors, and internal controls and procedures (Sarbanes-Oxley Essential Information). When audits are done to verify the validity of the financial statements, auditors must also verify the adequacy of the internal control and procedures. The Health Insurance Portability and Accountability Act (HIPAA) is designed to protect personal health information held by covered entities and gives patients' rights with respect to that information (Understanding Health Information Privacy). The Privacy...

...

The Gramm Leach Bliley Act regulates financial institutions to explain how information is shared and requires the safeguarding of sensitive information (Gramm Leach Bliley Act). Payment Card Industry's Data Security Standard (PCI DSS) protects privacy rights and requires encryption of credit and debit cards for purchases (Brenner, 2007).
Regardless of the industry, safeguarding sensitive information for employees, customers, and financial data is required to be safeguarded by at least one regulation. That means that information systems are required to do risk assessments on an ongoing basis and risk management is responsible for internal controls and procedures.

Principles of Least Privilege

The principle of least privilege is the practice of limiting access to the minimal level that will allow normal functioning (principle of least privilege (POLP)). This means that the lowest levels of user rights are given based on what is needed to perform the job. Some operating systems have least privilege built in. Even if they do not, there…

Sources Used in Documents:

Bibliography

Brenner. (2007). How Chevron Met the PCI DSS Deadline. Security Wire Daily News.

Gramm Leach Bliley Act. (n.d.). Retrieved from Bureau of Consumer Protection: http://business.ftc.gov/privacy-and-security/gramm-leach-bliley-act principle of least privilege (POLP). (n.d.). Retrieved from Search Security: http://searchsecurity.techtarget.com/definition/principle-of-least-privilege-POLP

Sarbanes-Oxley Essential Information. (n.d.). Retrieved from The Data Manager's Public Library: http://www.sox-online.com/basics.html

Tipton, K. & . (n.d.). Access Control Models. Retrieved from CC Cure.org: http://www.cccure.org/
Understanding Health Information Privacy. (n.d.). Retrieved from HHS.Gov: http://www.hhs.gov/ocr/privacy/hipaa/understanding/index.html


Cite this Document:

"Security Standards & Least Privilege Security Standards" (2012, July 25) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/security-standards-amp-least-privilege-81328

"Security Standards & Least Privilege Security Standards" 25 July 2012. Web.20 April. 2024. <
https://www.paperdue.com/essay/security-standards-amp-least-privilege-81328>

"Security Standards & Least Privilege Security Standards", 25 July 2012, Accessed.20 April. 2024,
https://www.paperdue.com/essay/security-standards-amp-least-privilege-81328

Related Documents

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Standards to Resolve Custody Disputes As society evolves, so do the laws and rules that govern it. Laws and the rules that go along with them are in a constant state of evolution because they may or may not be as pertinent in the present as they were in the past or the views and norms of society may have changed such that they have been made moot. This fact is

Standards-Based Assessment Across the nation, states are setting tough new education standards, defining what students should know and be able to do. To help students meet these standards -- and to measure their progress in doing so -- states are also designing and implementing new standards-based assessment systems.States and districts use two types of interrelated standards: those that specify the content (what students should know or be able to do at

Lesson Plan Amp; Reflection I didn't know what state you are in so was unable to do state/district standards! Lesson Plan Age/Grade Range; Developmental Level(s): 7-8/2nd Grade; Below grade level Anticipated Lesson Duration: 45 Minutes Lesson Foundations Pre-assessment (including cognitive and noncognitive measures): All students are reading below grade level (5-7 months) as measured by standardized assessments and teacher observation Curricular Focus, Theme, or Subject Area: Reading: Fluency, word recognition, and comprehension State/District Standards: Learning Objectives: Students will develop

Branding in Service Markets Amp Aim And Objectives Themes for AMP Characteristics Composing Branding Concept Branding Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Categories and Themes Branding Theory Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Branding Concept Characteristics Characteristics Composing Branding Concept Sampling of Studies Reviewed Evolution of Branding Theory Evolution of Marketing Service-Brand-Relationship-Value Triangle Brand Identity, Position & Image Just as marketing increasingly influences most aspects of the consumer's lives, brands