From Policy to Practice in Security Culture: What Security Frameworks Recommend

Anna Collard | Jul 10, 2024

Policy to Practice in Security CultureRecently I had to prepare for a governance, risk and compliance conference. I promptly realized that although I used to be quite immersed in this field as an ISO 27k implementation consultant and even a short stint as a Payment Card Industry (PCI QSA) auditor years ago, it has been a while since I looked into this.

Let’s dive right in. Most privacy and data protection laws will not specify details such as how to run a cybersecurity program. This would make these too specific and cybersecurity requirements are implied under general provisions such as ‘ensure adequate safeguards’, ‘ensuring ongoing confidentiality, integrity, availability, and resilience’ or similar statements. This is where security frameworks and best practices come in handy, providing a guideline on how to achieve that ‘adequate’ level of protection. 

The ISO/IEC 27000 series is a set of international standards developed to help organizations manage and protect their information assets within the context of an Information Security Management System (ISMS). What I always liked about the ISO 27000 standards is that they are risk based. It works like this: organizations tailor their security program based on their unique risk appetite and the selection of controls are not just about ticking off a predefined list but about addressing their specific organizational risks. For example, if an organization does not face significant physical threats, it may deprioritize controls related to physical security in favor of stronger network security measures.

We can probably agree though that in most organisations the human factor is a significant risk that warrants prioritization. Not because humans are the weakest link, but because they are in the firing line, being targeted by a flurry of social engineering attacks. Sixty-eight percent of all breaches reported in Verizon’s 2024 Data Breach Investigation Report include the human element. This is why creating a security culture and awareness program is part and parcel of pretty much any best practice or security standard out there.

Comparing security frameworks

I wanted to see what the most recent versions of popular security frameworks and best practice standards are saying about managing human risk and did a brief refresher on ISO, NIST and SANS Top 20.

Here's what they have to say about mitigating human risk:

Screenshot 2024-07-10 at 8.22.22 AM

Below are quick and easy summaries that organisations can use as guidance:

Start with a policy

It goes without saying that we need to establish security policies and communicate them effectively to all employees and relevant external parties. When looking at user facing acceptable use policies (AUPs) include specifics on how to use social media as well as emerging technologies, such as generative AI chatbots in a responsible way.

Role-Based Training

Training should be tailored to the specific roles and responsibilities of different personnel within the organization. This makes sense, the more relevant training content is to the audience, the more they will pay attention. For example, a call center environment will not only require different content or security guidance to finance departments, but might also appreciate different channels and content types. By providing content that is personally relevant, like online safety for parents, users are more likely to engage.  

Regular Training and Updates

Conducting regular training sessions keeps people updated on the latest threats, policies, and procedures. Using simulations and practical exercises can help reinforce learning.

Phishing Simulation Campaigns

Phishing simulations should be strategically utilized to create teachable moments based on the principle of "practice makes perfect." By allowing employees to learn from their mistakes in a safe and controlled environment, these simulations can significantly boost self-efficacy. This approach not only helps individuals understand the consequences of phishing attempts but also encourages mindful and deliberate reactions to potential threats. In an analysis of over 32 million users, we found that frequent phishing tests are more impactful on security culture than frequent training, but the increase of frequency of both training and phishing provided the best outcomes. Refer to this KnowBe4 whitepaper for more.

 Record Keeping

Maintaining comprehensive records of all security training activities are necessary to demonstrate compliance and track progress.

Continuous Improvement

Regularly reviewing and updating your security awareness training program is necessary to address emerging threats and incorporate feedback from training sessions. We recommend running a security culture survey or security awareness proficiency assessment to identify gaps or areas that need prioritization every year or at the beginning of major campaigns.

There you have it, by following the above steps in your security awareness and culture programs you should fare well on the next compliance audit.

For additional and practical tips on how to create and effectively run an impactful security culture program, have a look at our 7 Steps For Building a Security Culture checklist.

Discover Your Organization’s Phish-prone™ Percentage

Ninety-one percent of data breaches begin with spear phishing. Launch our Free Phishing Security Test for up to 100 users to uncover your team's vulnerability and see how your security posture stacks up against industry benchmarks.

Get Your Free Phishing Security Test

Secure the Digital Workforce: Human + AI

KnowBe4 empowers the modern workforce to make smarter security decisions every day. Trusted by more than 70,000 organizations worldwide, KnowBe4 is the pioneer of digital workforce security, securing both AI agents and humans. The KnowBe4 Platform provides attack simulation and training, collaboration security, and agent security powered by AIDA (Artificial Intelligence Defense Agents) and a proprietary Risk Score. The platform leverages 15 years of behavioral data to combat advanced threats including social engineering, prompt injection, and shadow AI. By securing humans and agents, KnowBe4 leads the industry in workforce trust and defense.