Categories: Blog

SANS Policy Templates: Clean Desk Policy

The SANS Institute has published several information security policy templates describing best data security practices in template format. This largely means that you can ‘fill in the blanks’ when developing a security policy (although some modification will be in order for your specific circumstances). In this post we’ll look at the SANS template for developing a clean desk policy as a part of overall network security.

A clean desk policy largely revolves around keeping company information confidential. This may be, but is not limited to customer information. Certainly there are examples of both customer and non-customer information becoming public which would, in the best circumstances, remain confidential to the company. In May, 2015 information security experts and computer consultants were sharing a screen capture of a BBC documentary which showed a login and password for a control system terminal for London’s rail system. While your company might or might not permit a camera to record operations for publicity, printing out passwords, whether on a desk blotter or taped to the monitor is a clear example of a clean desk policy failure.

If a clean desk policy means securing company information wherever it should be secured, that also includes laptop computers, which will probably leave the company premises at some point. Several times a year various American and European governments report laptops which have gone missing with sensitive information like social security numbers. Invariably a reporter asks if the laptop was encrypted, and all to often the answer is that it was not. Therefore your clean desktop policy may include laptop cable locks, encrypting hard drives and phasing out equipment which does not support what you consider necessary encryption standards.

Your clean desktop policy may also include walk-throughs by management to spot USB flash drives, tablets or phones plugged into company machines. In 2014 several security researchers suggested that electronic cigarette USB chargers appeared to be contacting Chinese servers. Enforcing your policy means that managers will need to be trained and refreshed on threats as they emerge as well as best practices.

For more information on determining a clean desktop policy, please contact us.

ginetworks

Share
Published by
ginetworks

Recent Posts

3 Types of Cloud Computing: Which One is Right for You?

The concept of cloud computing is far more expansive than most people realize. While enterprise…

4 years ago

6 Reasons To Make Hybrid Cloud Services Part of Your of 2021 Data Management Strategy

Use of cloud services has been on the rise in recent years, and the recent…

4 years ago

Creating and Implementing a Business Continuity Plan

Running a business requires planning for every eventuality. Backing up servers, creating copies of important…

4 years ago

Native and Shift Cloud Migrations: What You Need to Know About Cloud Services

By now, you know the truth: Cloud services are here to stay. Where businesses once…

4 years ago

Cloud Services Enables Remote Working

Last year’s pandemic has created a massive shift in the marketplace and has brought with…

4 years ago

Could Your Business Benefit from a Multi-Cloud Infrastructure?

All businesses, regardless of size, can benefit from some form of cloud service. Cloud environments…

4 years ago