Policies vs Standards

Policies vs Standards

Posted by ComplianceForge Support on Dec 13, 2024

What is the difference between a policy and a standard? The differences are:

  • 1.Granularity / specificity of requirements; and
  • 2.Scope.

A policy is a high-level statement of management’s intent that formally establishes requirements to guide decisions and has strategic implications for the entire organization. Policies are intended to come from the CEO or board of directors. A few policy examples are:

  • EXAMPLE COMPANY shall ensure all technology platforms used in support of its business operations adhere with industry recognized secure configuration management practices. Current and accurate inventories of technology platforms shall be maintained so applicable secure configuration settings can be enforced on those technology platforms; or
  • EXAMPLE COMPANY shall achieve and maintain situational awareness through comprehensive and ongoing monitoring activities to help ensure the security and resilience of its technology infrastructure against both physical and cyber threats. Technology assets shall be configured according to secure configuration management requirements to enable the capture of relevant security event logs. A centralized log analysis capability shall be used to identify anomalous behavior and support incident response operations so that appropriate steps can be taken to remediate potential incidents.

A standard is a formally established requirement regarding a process, action or configuration that is meant to be an objective or quantifiable expectation to be met. Standards are granular, clear requirements that support policies. A few standards examples are:

  • EXAMPLE COMPANY utilizes the “principle of least privilege,” which states that only the minimum access and functionality necessary to perform an operation should be granted and only for the minimum amount of time necessary. Asset custodians are required to:
    • Identify and remove insecure services, protocols and ports;
    • Enable only necessary and secure services, protocols and daemons, as required for the function of the system;
    • Implement security features for any required services, protocols or daemons that are considered to be insecure (e.g., NetBIOS, Telnet, FTP, etc.);
    • Verify services, protocols and ports are documented and properly implemented by examining device settings; and
    • Remove all unnecessary functionality, such as:
      • Scripts;
      • Drivers;
      • Features;
      • Subsystems;
      • File systems; and
      • Unnecessary web servers.
  • Asset custodians are required to configure all systems, devices and applications to implement automated audit trails for all system components and automatically forward security-related event logs to a centralized log collector or Security Incident Event Management (SIEM) solution to allow EXAMPLE COMPANY security personnel to reconstruct the following events:
    • All individual user accesses to sensitive data (e.g., payment card data, SSNs, financial accounts, etc.);
    • All actions taken by any individual with root or administrative privileges;
    • Access to all audit trails;
    • Invalid logical access attempts;
    • Use of and changes to identification and authentication mechanisms, including but not limited to:
      • Creation of new accounts and elevation of privileges; and
      • All changes, additions or deletions to accounts with root or administrative privileges;
    • Initialization, stopping or pausing of the audit logs; and
    • Creation and deletion of system-level objects.

If you would like to learn more about policies & standards, you can read more about it here - https://complianceforge.com/grc/policy-vs-standard-vs-control-vs-procedure.

You can also find additional information about policies, control objectives, guidelines, controls, procedures & metrics with examples here - https://complianceforge.com/content/pdf/complianceforge-cybersecurity-documentation-template-examples.pdf