Nested Knowledge

Bringing Systematic Review to Life

User Tools

Site Tools


Security Awareness Training Policies

I. Purpose

Nested Knowledge has a responsibility to educate our personnel on security practices and to comply with federal regulations related to Information Security awareness. This policy describes our plan to educate users on the importance of security.

II. Scope

This policy affects all employees, contractors, and consultants of Nested Knowledge.

III. Security Awareness Training Policy

Nested Knowledge distributes security policies to all employees and contractors as part of their training. Training includes a quiz on the content of each policy. Training is conducted annually, for all policies relevant to an employees job duties.

When policies are updated, we ensure that all employees have ready access to the most recent version. All employees with roles in incident response, data protection, or data recovery must sign off on the corresponding policy. We require all remote employees to review the remote access policy.

TrainingDelivered to
Acceptable Use of IT ResourcesAll
Incident ResponseIncident Response Team
Cloud SecurityDevelopment Team
Information SecurityAll
Wireless ConnectionAll
Secure DevelopmentDevelopment Team
Disaster Recovery Executive Team
Security AwarenessAll
GDPR ComplianceAll
Remote AccessAll

Developer Training

Developers are expected to be familiar with common vulnerabilities in web applications, how to detect them, and how to mitigate them. To standardize this expectation, OWASP modules & guidelines are trained. Specifically:

  • All developers perform an annual review of the OWASP Top 10 and pass a practical quiz relating to vulnerabilities within.
  • Each developer annually completes a randomly selected test from the OWASP Web Security Testing Guidelines (WSTG) on the Nested Knowledge software
    • Scenarios will be selected and assigned by the Technical Lead using our issue management software
    • Each scenario includes a description of the threat, and testing methods. The developer inventories surface area, and performs a test/penetration in a development environment, as applicable.
    • The developer writes up their approach & findings in the issue, which is then reviewed by the technical lead.
  • Any developer introducing a vulnerability identified in code review or later is expected to:
    • Study the corresponding OWASP Cheat Sheet(s), when relevant.
    • Demonstrate understanding of the threat to the technical lead, with regards to both the code instance and the general threat model.
    • With the technical lead, perform a review of relevant code examples in the code base and explain the mitigations used.
  • OWASP Global AppSec training & webinar attendance is assigned on a discretionary basis (by the technical lead) for developers failing to achieve & demonstrate expected understanding of the above materials and exercises, or junior members of the team.

IV. Data Protection Training Policy

Employee training requirements are based on the data classification system. All employees and contractors will be provided with our data protection policy. Those who deal with confidential data, restricted use data, or high-risk personal data will be required to demonstrate understanding of our data protection procedures.


Employees who fail to review and comply with our information security policies, including the access control and incident management policy, will be issued a warning and required to demonstrate comprehension of security rules and procedures. Continued failure may result in disciplinary action.

Revision History

AuthorDate of Revision/ReviewComments
K. Cowie12/15/2021
K. Holub4/12/2024Adding listing of all current policies

Return to Policies

wiki/policies/security_training.txt · Last modified: 2024/04/12 17:15 by kholub