Conduct role-specific security awareness and skills training. Example implementations include
secure system administration courses for IT professionals, OWASP® Top 10 vulnerability awareness
and prevention training for web application developers, and advanced social engineering awareness
training for high-profile roles.
The organization enhances its security training by developing role-specific modules, providing secure system administration courses for IT staff, offering OWASP Top 10 vulnerability training for developers, and delivering advanced social engineering awareness for high-risk roles.
The security guidelines are specified in connection with the employee's job role. The organization has identified units and roles that require separate guidance and develops its own detailed security guidelines for these.
Examples of units that may require their own guidelines are e.g. customer service, IT and HR. Examples of work roles that require their own instructions are the system administrators and the remote workers.
Training arranged before granting access rights applies not only to new employees but also to those who move to new tasks or roles, especially when the data systems used by the person and the security requirements related to the job role change significantly with the change of job role. The training is arranged before the new job role becomes active.