{"id":16,"date":"2008-04-10T14:11:51","date_gmt":"2008-04-10T21:11:51","guid":{"rendered":"http:\/\/blog.cosaint.net\/?p=16"},"modified":"2023-01-25T07:23:47","modified_gmt":"2023-01-25T07:23:47","slug":"best-practices-for-security-awareness-training","status":"publish","type":"post","link":"https:\/\/www.empowerelearning.com\/blog\/best-practices-for-security-awareness-training\/","title":{"rendered":"Best Practices for Security Awareness Training"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-609\" title=\"aplus\" src=\"https:\/\/www.empowerbpo.com\/blog\/wp-content\/uploads\/2008\/04\/aplus1.gif\" alt=\"aplus\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2008\/04\/aplus1.gif 150w, https:\/\/www.empowerelearning.com\/blog\/wp-content\/uploads\/2008\/04\/aplus1-100x100.gif 100w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>We recently completed a security training needs assessment for one of the states here on the West Coast. Part of the study was to identify a list of accepted &#8220;best practices&#8221; in security awareness training.<\/p>\n<p><!--more--><\/p>\n<p>To do this, we started from a definition given by Dr. John Nugent of the University of Dallas Center of Information Assurance:<\/p>\n<blockquote><p><i>Best Practices are those documented, accessible, effective, appropriate, and widely accepted strategies, plans, tactics, processes, methodologies, activities, and approaches developed by knowledgeable bodies and carried out by adequately trained personnel which are in compliance with existing laws and regulations and that have been shown over time through research, evaluation, and practice to be effective at providing reasonable assurance of desired outcomes, and which are continually reviewed and improved upon as circumstances dictate.<\/i><\/p><\/blockquote>\n<p>Then, we looked for established training practices that met the following criteria:<\/p>\n<ul>\n<li>Documented.<\/li>\n<li>Widely accepted.<\/li>\n<li>Developed by knowledgeable bodies.<\/li>\n<li>In compliance with existing laws and regulations.<\/li>\n<li>Effective at providing reasonable assurance of desired outcomes.<\/li>\n<li>Continually reviewed and improved upon.<\/li>\n<\/ul>\n<p>We looked closely at IT and business standards, laws and regulations, and official guidance documents such as:<\/p>\n<ul>\n<li>ISO 17799<\/li>\n<li>COBIT 4.0<\/li>\n<li>HIPAA (Privacy &amp; Security Rules)<\/li>\n<li>GLB-A<\/li>\n<li>PCI Data Security Standard<\/li>\n<li>OMB Circular A-130<\/li>\n<li>FISMA<\/li>\n<li>NIST SP 800-16<\/li>\n<li>NIST SP 800-50<\/li>\n<li>Section 508 of the Rehabilitation Act<\/li>\n<\/ul>\n<p>Here are 17 of the best practices that were identified as a result of the study cross-referenced against the sources.<\/p>\n<table border=\"0\" width=\"100%\" cellspacing=\"3\" cellpadding=\"3\">\n<tbody>\n<tr>\n<td style=\"border-top: green 1.5pt solid;\" colspan=\"3\" valign=\"top\"><strong>STRATEGY &amp; PLANNING <\/strong><strong><br \/>\n<\/strong><\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">1<\/td>\n<td valign=\"top\"><b>Mandatory Security Awareness<\/b><br \/>\nSecurity awareness training is mandatory for all staff (including management).<\/td>\n<td valign=\"top\">ISO 17799<br \/>\nCOBIT 4.0<br \/>\nHIPAA Security Rule<br \/>\nBITS FISAP<br \/>\nFISMA<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">2<\/td>\n<td valign=\"top\"><b>Training for Third Parties<\/b><br \/>\nAll third parties with access to an organization\u2019s information receive the same security awareness training, or training to an equivalent level.<\/td>\n<td valign=\"top\">ISO 17799<br \/>\nPCI Data Security Std.<br \/>\nFISMA<br \/>\nOMB Circular A-130<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">3<\/td>\n<td valign=\"top\"><b>Training is Required Before Access is Granted<\/b><br \/>\nSecurity awareness training commences with a formal induction process designed to introduce the organization\u2019s security policies and expectations before access to information or services is granted.<\/td>\n<td valign=\"top\">ISO 17799<br \/>\nOMB Circular A-130<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">4<\/td>\n<td valign=\"top\"><b>Staff Must Acknowledge Policy<\/b><br \/>\nStaff are required to acknowledge that they have read and understood the organization\u2019s information security policy.<\/td>\n<td valign=\"top\">PCI Data Security Std.<br \/>\nGLB-A<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">5<\/td>\n<td valign=\"top\"><b>Training at Least Annually<\/b><br \/>\nAll staff (and third parties) are exposed to security awareness training at least once per year.<\/td>\n<td valign=\"top\">NIST SP 800-50<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">6<\/td>\n<td valign=\"top\"><b>Periodic Security Reminders<\/b><br \/>\nAll staff are provided with periodic reminders about information security.<\/td>\n<td valign=\"top\">HIPAA Security Rule<br \/>\nNIST SP 800-50<br \/>\nGLB-A<br \/>\nOMB Circular A-130<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">7<\/td>\n<td valign=\"top\"><b>Management Support<\/b><br \/>\nManagement supports and (where appropriate) attends security awareness sessions.<\/td>\n<td valign=\"top\" nowrap=\"nowrap\">COBIT 4.0<br \/>\nBITS Critical Success Factors<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">8<\/td>\n<td valign=\"top\"><b>Multiple Points of Contact<\/b><br \/>\nWhere possible, multiple points of contact (e.g. IT, HR) are used to stress the importance of the program.<\/td>\n<td valign=\"top\">BITS Critical Success Factors<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: green 1.5pt solid;\" colspan=\"3\" valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" valign=\"top\"><strong>PROGRAM DESIGN &amp; DEVELOPMENT <\/strong><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">9<\/td>\n<td valign=\"top\"><b>Common Level of Security Literacy<\/b><br \/>\nA &#8220;Common Level&#8221; of security training applicable to all staff in this and other organizations has been identified.<\/td>\n<td valign=\"top\">NIST SP 800-16<br \/>\nNIST SP 800-50<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">10<\/td>\n<td valign=\"top\"><b>Role-Based Training<\/b><br \/>\nIn addition to the &#8220;Common Level&#8221;, training for staff is segmented based on roles and tailored accordingly.<\/td>\n<td valign=\"top\">NIST SP 800-16<br \/>\nBITS Critical Success Factors<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">11<\/td>\n<td valign=\"top\"><b>Training Content<\/b><br \/>\nSecurity awareness training includes:<\/p>\n<ul>\n<li>Information on known threats, including discussion of malicious software.<\/li>\n<li>Security requirements including the good password practice, and the importance of monitoring login failure.<\/li>\n<li>Legal responsibilities.<\/li>\n<li>Business controls.<\/li>\n<li>Information on the disciplinary process.<\/li>\n<li>Who to contact for further security advice or to report incidents.<\/li>\n<\/ul>\n<p>Specific content has been determined based on a needs assessment including consideration of regulatory requirements.<\/td>\n<td valign=\"top\">NIST SP 800-50<br \/>\nISO 17799<br \/>\nPCI Data Security Std.<br \/>\nHIPAA Security Rule<br \/>\nGLB-A<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">12<\/td>\n<td valign=\"top\"><b>References to Security Outside Work<\/b><br \/>\nTraining includes the importance of security to the individual\u2019s life outside of work.<\/td>\n<td valign=\"top\">NIST SP 800-50<br \/>\nBITS Critical Success Factors<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: green 1.5pt solid;\" colspan=\"3\" valign=\"top\"><\/td>\n<\/tr>\n<tr>\n<td colspan=\"3\" valign=\"top\"><strong>DELIVERY &amp; ADMINISTRATION <\/strong><\/p>\n<p>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">13<\/td>\n<td valign=\"top\"><b>Multiple Delivery Modes<\/b><br \/>\nWhere possible, multiple delivery modes are used to suit different learning modes.<\/td>\n<td valign=\"top\">NIST SP 800-50<br \/>\nBITS Critical Success Factors<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">14<\/td>\n<td valign=\"top\"><b>IT is Leveraged to Provide Training<\/b><br \/>\nInformation technology is used in an optimized manner to automate training, and to provide tools for the training and education program.<\/td>\n<td valign=\"top\">COBIT 4.0<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">15<\/td>\n<td valign=\"top\"><b>Accessibility for Staff with Disabilities <\/b><br \/>\nWhere practical, all training materials should be made accessible to staff with disabilities. Where this is not possible, alternative forms of training are provided.<\/td>\n<td valign=\"top\">Section 508<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">16<\/td>\n<td valign=\"top\"><b>Record Keeping<\/b><br \/>\nRecords of staff training are kept in personnel records, or in a compliance-tracking tool\/database.<\/td>\n<td valign=\"top\">NIST SP 800-50<br \/>\nBITS FISAP<br \/>\nHIPAA Security Rule<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\">17<\/td>\n<td valign=\"top\"><b>Metrics<\/b><br \/>\nBoth qualitative and quantitative metrics are used to obtain feedback, and to measure the effectiveness of the training program.<\/td>\n<td valign=\"top\">NIST SP 800-50<br \/>\nBITS Critical Success Factors<\/td>\n<\/tr>\n<tr>\n<td style=\"border-bottom: green 1.5pt solid;\" colspan=\"3\" valign=\"top\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>We recently completed a security training needs assessment for one of the states here on the West Coast. Part of the study was to identify a list of accepted &#8220;best practices&#8221; in security awareness training.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,6],"tags":[],"class_list":["post-16","post","type-post","status-publish","format-standard","hentry","category-education","category-infosec"],"_links":{"self":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/16","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/comments?post=16"}],"version-history":[{"count":0,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/posts\/16\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/media?parent=16"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/categories?post=16"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.empowerelearning.com\/blog\/wp-json\/wp\/v2\/tags?post=16"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}