Often, it is useful to see how other organizations execute their policies. The following sites show you how the National Institute of Heath (http://cio.berkeley.edu/policies.html) and Berkeley University (http://irm.cit.nih.gov/security/sec_policy.html) created their policies.
The following links provide an extensive bouquet of information and examples pertaining to policies:
The following site will point you to a relatively inexpensive tool for policy creation http://www.network-and-it-security-policies.com.
NIST develops a majority of the standards embodied in the industry. At the following Web site, you can find a wealth of information on checklists, guidelines and procedures from topics ranging from incident response, wireless security, HIPPA, Voice over IP and much more. This should be a familiar Web site to anyone in the security field http://csrc.nist.gov/publications/nistpubs.
For security checklists there are a number of sites to visit, depending upon what you need to evaluate.
Dig Deeper on Information Security Policies, Procedures and Guidelines
Related Q&A from Shon Harris, Contributor
When it comes to firewalls, the networking group often handles the installation, while the information security department writes the rules. Should ...continue reading
In today's security world, it's hard to keep track of each and every management standard and auditing procedure. In this SearchSecurity.com Q&A, ...continue reading
Before you begin putting the pieces of your security program together, you may want to have a look at ISO 27001. In this expert Q&A, Shon Harris ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.