The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for developing a clean desk policy as a part of overall network security.
A clean desk policy largely revolves around keeping company information confidential. This may be, but is not limited to customer information. Certainly there are examples of both customer and non-customer information becoming public which would, in the best circumstances, remain confidential to the company. In May, 2015 information security experts and computer consultants were sharing a screen capture of a BBC documentary which showed a login and password for a control system terminal for London’s rail system. While your company might or might not permit a camera to record operations for publicity, printing out passwords, whether on a desk blotter or taped to the monitor is a clear example of a clean desk policy failure.
If a clean desk policy means securing company information wherever it should be secured, that also includes laptop computers, which will probably leave the company premises at some point. Several times a year various American and European governments report laptops which have gone missing with sensitive information like social security numbers. Invariably a reporter asks if the laptop was encrypted, and all to often the answer is that it was not. Therefore your clean desktop policy may include laptop cable locks, encrypting hard drives and phasing out equipment which does not support what you consider necessary encryption standards.
Your clean desktop policy may also include walk-throughs by management to spot USB flash drives, tablets or phones plugged into company machines. In 2014 several security researchers suggested that electronic cigarette USB chargers appeared to be contacting Chinese servers. Enforcing your policy means that managers will need to be trained and refreshed on threats as they emerge as well as best practices.
For more information on determining a clean desktop policy, please contact us.
The concept of cloud computing is far more expansive than most people realize. While enterprise…
Use of cloud services has been on the rise in recent years, and the recent…
Running a business requires planning for every eventuality. Backing up servers, creating copies of important…
By now, you know the truth: Cloud services are here to stay. Where businesses once…
Last year’s pandemic has created a massive shift in the marketplace and has brought with…
All businesses, regardless of size, can benefit from some form of cloud service. Cloud environments…