REGULATORY FRAMEWORK FOR THE DEVELOPMENT OF AN ORGANISATION'S INFORMATION SECURITY MANAGEMENT POLICY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.26.693

Keywords:

cybersecurity;, management policy;, information security management of organisations;, compliance management of enterprise information security

Abstract

The article deals with the problem of imperfection of regulatory documents in terms of revision of the main regulatory legal acts, their updating in accordance with changes and trends in the protection of information resources. The author emphasises the need to improve the compliance of organisations with due regard for the active digitisation of services in Ukraine, integration into the global digitalised space, as well as the active use of information and communication technologies, and expansion of the range of services in the field of electronic communications, which are the reasons for new attacks on enterprises. The author emphasises that these trends necessitate strengthening the protection of information flows of organisations (against unauthorised access, leakage of confidential data, loss of information assets, dissemination of intellectual property, dissemination of information constituting a trade secret) on the basis of a reliable regulatory framework. The article provides definitions of the following concepts: “information security policy”, “information security policy”, “bank information security policy”, and the resources that are the objects of dissemination of the organisation’s information security policy are presented. The authors have thoroughly monitored the regulatory and legal documents and identified the main regulatory documents on ensuring information security of organisations, namely: laws, regulations, resolutions, international standards, presidential decrees regulating cybersecurity and information protection of organisations operating in the financial sector. The results of the monitoring of documents and their summary are considered as the basis for the formation of compliance enhancements and the possibility of their implementation in the practical activities of banks in the development of information security management policies by cybersecurity specialists (chief compliance officer (CCO) and chief information security officer (CISO)).

Downloads

Download data is not yet available.

References

Titova, V., Kliots, Yu., Volynets, V., Petliak, N., & Ohorodnyk, M. (2024). Development of an information security policy for a private enterprise Rozroblennia polityky informatsiinoi bezpeky pryvatnoho pidpryiemstva. Measuring and Computing Devices in Technological Processes, 3, 79–83. https://doi.org/10.31891/2219-9365-2024-79-10

Chubaievskyi, V. (2022). Methods of corporate information security management. Ekonomika ta suspilstvo, 43. https://doi.org/10.32782/2524-0072/2022-43-49

Bosak, A., Verzhykovskyi, V., Kalinin, I., Maksymiv, I., Prystupa, D., & Ryvak, O. (2023). Principles of formation of enterprise information security. International Scientific Journal «Internauka». Series: Economic Sciences, 11(79). https://doi.org/10.25313/2520-2294-2023-11-9157

Rzhevska, N., & Feshchenko, A. (2022). The peculiarities of space state information policy. Language-Cultura-Politics. International Journal, 1, 247–264. https://doi.org/ 10.54515/lcp.2022.1.247-264

Kurii, Y., & Opirskyy, I. (2023). ISO 27001: Analysis of changes and compliance features of the new version of the standard. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(19), 46–55. https://doi.org/10.28925/2663-4023.2023.19.4655

Chmutova, I. M., Bezrodna, O. S., & Nechyporenko, D. I. (2020). The methodological instrumentarium for assessing compliance risks of financial monitoring of banks. Business Inform, 11(514), 296–309. https://doi.org/10.32983/2222-4459-2020-11-296-309

Herasymchuk, T. F., Kyrydon, A. M., & Troian, S. S. (2017). Zahalna teoriia polityky: Navchalnyi posibnyk [General theory of politics: A study guide], Kondor.

Kolbech, H. K. (2004). Polityka: Osnovni kontseptsii v suspil`nykh naukakh [Politics: Basic concepts in the social sciences]. Vydav. dim «KM Akademiia».

On Approval of the Methodological Recommendations for Ensuring Cyber Security of Automated Process Control Systems, Order, № 463 (2023) (Ukraine). https://ips.ligazakon.net/document/fn077605?an=37&ed=&dtm=&le=

On Approval of the General Requirements for the Cyber Defence of Critical Infrastructure Objects, Resolution of the Cabinet of Ministers of Ukraine No. 518 (2022) (Ukraine). https://zakon.rada.gov.ua/laws/show/518-2019-п#Text

On Amendments to Certain Regulatory Acts of the National Bank of Ukraine, Resolution of the National Bank of Ukraine № 40 (2023) (Ukraine). https://zakon.rada.gov.ua/laws/show/v0040500-23#Text

On Approval of the Regulation on the Organisation of the Risk Management System in Banks of Ukraine and Banking Groups, Resolution of the National Bank of Ukraine № 64 (2024) (Ukraine). https://zakon.rada.gov.ua/laws/show/v0064500-18#Text

On Approval of the Regulation on the Organisation of Measures to Ensure Information Security in the Banking System of Ukraine, Resolution of the National Bank of Ukraine № 95 (2017) (Ukraine). https://zakon.rada.gov.ua/laws/show/v0095500-17#Text

On Approval of the Regulation on Monitoring of Banks’ Compliance with Legislative Requirements on Information Security, Cyber Security and Electronic Trust Services, Resolution of the Board of the National Bank of Ukraine № 4 (2021). https://bank.gov.ua/ua/legislation/Resolution_16012021_4

PCI COUNCIL LLC. (2024). Standart (PCI DSS/ v.4.0.1.). https://east.pcisecuritystandards.org/document_library?category=pcidss&document=pci_dss

What are the 12 requirements of PCI DSS Compliance? (б. д.). ControlCase. https://www.controlcase.com/what-are-the-12-requirements-of-pci-dss-compliance/

Regulation (eu) 2016/679 of the European Parliament and of the Council (б. д.). EUR-Lex repealing Directive 95/46/EC (General Data Protection Regulation. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32016R0679

EU Datenschutz Grundverordnung (EU-DSGVO). (б. д.). EU Datenschutz Grundverordnung (EU-DSGVO). https://www.privacy-regulation.eu/

INFORMATION SECURITY CONTROLS. (2022). ISO/IEC 27001:2022. IT Governance Publishing. https://doi.org/10.2307/j.ctv30qq13d.8

International Standart. (2022). Information security, cybersecurity and privacy protection — Information security controls (ISO/IEC 27002:2022).

Hulak, H. M., Zhiltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2024). Information and cyber security of the enterprise. Textbook. Lviv: Publisher Marchenko T. V.

Downloads


Abstract views: 0

Published

2024-12-19

How to Cite

Kapeliushna, T., Lehominova, S., Muzhanova, T., & Tyshchenko, V. (2024). REGULATORY FRAMEWORK FOR THE DEVELOPMENT OF AN ORGANISATION’S INFORMATION SECURITY MANAGEMENT POLICY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(26), 235–245. https://doi.org/10.28925/2663-4023.2024.26.693

Most read articles by the same author(s)