{"id":1367,"date":"2021-03-08T08:58:48","date_gmt":"2021-03-08T08:58:48","guid":{"rendered":"https:\/\/blog.samarthya.me\/wps\/?p=1367"},"modified":"2021-03-08T09:08:52","modified_gmt":"2021-03-08T09:08:52","slug":"security-standards-baselines-and-guidelines-formalized-security-policy-structure","status":"publish","type":"post","link":"https:\/\/blog.samarthya.me\/wps\/2021\/03\/08\/security-standards-baselines-and-guidelines-formalized-security-policy-structure\/","title":{"rendered":"Security Standards, Baselines and Guidelines: Formalized security policy structure."},"content":{"rendered":"<h1><\/h1>\n<h1>Standards<\/h1>\n<blockquote><p>Standards are <code>tactical documents<\/code> that define steps or methods to accomplish the goals and overall direction defined by the security policies.<\/p><\/blockquote>\n<ol>\n<li>They define compulsory requirements for homogeneous use of software hardware and security controls.<\/li>\n<li>Provides for a uniform implementation throughout an organization.<\/li>\n<\/ol>\n<h1>Baseline<\/h1>\n<blockquote><p>Defines a minimum level of security that every system within the organization should meet.<\/p><\/blockquote>\n<ol>\n<li>Establishes a common foundational secure state on which additional measures can be built.<\/li>\n<li>Additional layers are more stringent and as per the organization needs.<\/li>\n<li>Often are system specific and pertinent to an industry or government standard.<\/li>\n<\/ol>\n<h1>Guidelines<\/h1>\n<blockquote><p>Recommends how standards and baselines should be implemented to serve as an operational guide for both security professionals and end users.<\/p><\/blockquote>\n<ol>\n<li>They are flexible<\/li>\n<li>Stares security mechanisms rather than specific products and settings.<\/li>\n<li>Not compulsory<\/li>\n<li>Outline methodologies<\/li>\n<\/ol>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-1371 size-full\" src=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2021\/03\/SPS1.png\" alt=\"\" width=\"671\" height=\"389\" srcset=\"https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2021\/03\/SPS1.png 671w, https:\/\/blog.samarthya.me\/wps\/wp-content\/uploads\/2021\/03\/SPS1-300x174.png 300w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><\/p>\n\n\n<p>The purpose of procedure is to ensure integrity of business process. It helps in standardization of security across systems in an organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Standards Standards are tactical documents that define steps or methods to accomplish the goals and overall direction defined by the security policies. They define compulsory requirements for homogeneous use of software hardware and security controls. Provides for a uniform implementation throughout an organization. Baseline Defines a minimum level of security that every system within the [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1368,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[34],"tags":[175,171,174,173,176],"class_list":["post-1367","post","type-post","status-publish","format-image","has-post-thumbnail","hentry","category-technical","tag-baselines","tag-cissp","tag-guidelines","tag-seuritypolicystructure","tag-standards","post_format-post-format-image"],"_links":{"self":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/1367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/comments?post=1367"}],"version-history":[{"count":0,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/posts\/1367\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media\/1368"}],"wp:attachment":[{"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/media?parent=1367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/categories?post=1367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.samarthya.me\/wps\/wp-json\/wp\/v2\/tags?post=1367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}