Back to policies

Security Training and Awareness

## Policy Statement

Category

Policies

Applies to

General guidance

Coverage

0 controls, 0 queries

Asset types

Not specified

Overview

Policy Statement

your organization promotes a Security-First culture. To support this culture, the company is committed to providing financial and moral support for employees in the processes of:

  • acquiring certifications (cloud competencies, security certifications, etc.);
  • being trained in skills they are missing or are needed to perform their job functions;
  • receiving proper education about your organization policies and procedures;
  • raising security awareness for both the individual and the entire company.

your organization has named the following responsibles:

  • Chief Information Security Officer - in charge of HITRUST, HIPAA, ISO 27001, PCI-DSS;
  • Chief Data Protection Officer - in charge of ISO 27001, HIPAA;
  • Chief Privacy Officer - in charge of GDPR, CCPA, HIPAA;

For managing training and security awareness programs for employees, your organization is using a SaaS-based solution offered by Mimecast. This tool offers traceable progress, phishing tests, and helps your organization to predict employee security risks.

Scope

All your organization employees with access to Protected and Confidential data and information assets must participate in information security awareness training. When appropriate, information security training will be provided to individuals whose job functions require specialized skills or knowledge in information security.

Procedures

Procedures and mapped controls

Importance of Security

At your organization we take product security very seriously. your organization practices include designing for both security and privacy, in product software, IT applications, and cloud services.

We have rigorous software security policies and processes designed to proactively find and remove software security defects such as security vulnerabilities.

your organization products, IT applications, and cloud services must not only fulfill the stated function to help protect your organization customers, the your organization software itself must also aim to protect itself from vulnerabilities and attackers. your organization strives to build software that demonstrates resilience against attacks.

Developers are expected to pursue ongoing developer education. Self-training is encouraged.

Timeline for Security Training and Awareness
  • your organization requires new employees to take a security awareness training within 30 days of joining;
  • your organization requires existing employees to take security awareness training annually;
  • your organization requires existing employees to take security awareness training within 30 days in case of a major change in the company's infrastructure or systems.
Training

When necessary, the information security program must provide or coordinate training for individuals whose job functions require special knowledge of security threats, vulnerabilities, and safeguards. This training must focus on expanding knowledge, skills, and abilities for individuals who are assigned information security responsibilities. To begin training, the employee must make an official request (email) to the CISO.

Certifications

IT professionals with cloud or security skills are in high demand and certifications can help make you even more hirable by validating your cloud skills and expertise. At the same time, cloud certifications help your organization become more trustworthy and powerful.

your organization covers costs to acquire training and certifications, including but not limited to:

  • Google Certified Professional Cloud Architect
  • Google Certified Professional Data Engineer
  • AWS Certified Solutions Architect – Associate
  • AWS Certified SysOps Administrator
  • AWS Certified Developer – Associate
  • Microsoft Certified: Microsoft Azure Fundamentals
  • Microsoft Certified: Azure Administrator Associate
  • Microsoft Certified: Azure Solutions Architect Expert
  • Certified Cloud Security Professional (CCSP)
  • CompTIA Cloud+
Awareness

One of the goals of a robust security-training program is to raise awareness and understanding of cyber threats with staff. However, to motivate change it is often necessary to not just punish negative behavior but to reward positive behavior. A reward system in place for employees that follow procedures and complete testing according to the training roadmap will engage staff in the success of security. Rewards should also be provided for reporting security issues and concerns to keep lines of communication open.

your organization promotes on-going information security awareness via:

  • Regular articles published in corporate newsletters;
  • Information security bulletins distributed to all employees to address security policy modifications, security alerts, and other urgent security issues;
  • Optional: distribution of employee manuals to all employees requiring annual sign-off of agreement and compliance.
Conduct random simulations

A common mistake made in security awareness training is simply using the same simulation techniques at the same time intervals. To get a real understanding of security preparedness, conduct simulations at random times. Try not to always give any advanced warning of the simulation. Companies can gain actionable data on the success of their training through careful scheduling and comprehensive analysis. More info in the Incident Response Policy

Query logic

These are the stored checks tied to this policy.

No stored query bodies are attached to this entry.

Cyscale Logo
Cyscale is an agentless cloud-native application protection platform (CNAPP) that automates the contextual analysis of cloud misconfigurations, vulnerabilities, access, and data, to provide an accurate and actionable assessment of risk.

Stay connected

Receive new blog posts and product updates from Cyscale

By clicking Subscribe, I agree to Cyscale’s Privacy Policy


© 2026 Cyscale Limited

LinkedIn icon
Twitter icon
Facebook icon
crunch base icon
angel icon