Security Awareness Training Policy
Document Version: 1.0
Last Updated: July 19, 2025
Owner: Chief Information Security Officer (CISO)
1. Purpose
This policy establishes the requirements and responsibilities for providing security awareness and training to all employees, contractors, and relevant third-party personnel. The purpose is to reduce risk from human-related security threats through education and consistent reinforcement of security best practices.
2. Scope
This policy applies to all personnel who have access to DevSecOpsBook’s systems, data, applications, networks, or facilities—including employees, contractors, interns, and third-party service providers.
3. Policy Statements
3.1 Mandatory Security Awareness Training
- All new personnel must complete security awareness training within 30 days of their start date.
- Annual refresher training is mandatory for all personnel with system or data access.
- Training must cover topics such as:
- Password hygiene and multifactor authentication (MFA)
- Phishing, social engineering, and email security
- Acceptable use of IT resources
- Secure handling of sensitive data (e.g., PII, customer data)
- Reporting security incidents or suspicious activities
3.2 Role-Based Training
- Specialized security training must be provided based on the individual’s role and access level. For example:
- Developers must be trained in secure coding practices and secure DevOps.
- System administrators must understand patch management, access controls, and audit logging.
3.3 Awareness Reinforcement
- Ongoing awareness is reinforced through periodic simulated phishing campaigns, newsletters, and security tips.
- Topics are updated based on emerging threats and lessons learned from internal incidents or industry events.
3.4 Training Records and Audits
- Completion of all training sessions must be logged and tracked in a centralized Learning Management System (LMS).
- HR and the CISO jointly ensure that records are maintained for audit and compliance verification purposes.
- Non-compliance is escalated to the employee’s manager and may result in restricted access until completion.
3.5 Acknowledgment
- All personnel must sign an acknowledgment form confirming completion of training and acceptance of the organization’s security policies.
4. Responsibilities
Role | Responsibility |
---|---|
CISO | Define curriculum, review training content annually |
HR Department | Track training completion, manage onboarding process |
Department Managers | Ensure direct reports complete required training |
Employees & Contractors | Complete assigned training on time |
5. References
- SOC 2 Common Criteria: CC2.2 (User Responsibilities), CC4.2 (Personnel Screening & Training), CC6.2 (Security Awareness)
- NIST SP 800-50: Building an Information Technology Security Awareness and Training Program
- ISO/IEC 27001: A.7.2.2 Information Security Awareness, Education, and Training