Q

Resources for writing a security policy

If you've never written a security policy before, where can you obtain information on compiling one? My concern is making sure I cover all aspects and use the correct terminology in the document.
The one book I have found most useful to new comers is Information Security Policies Made Easy, by Cresson. It comes with a CD that makes tailoring to your environment and searching extremely easy. There is a new version out as of May 2001. Another author I would recommend is Thomas Peltier. He has been in security for many many years and is excellent. Peltier has a new book due to be released in December 2001, Information Security Policies, Procedures and Standards: Guidelines For Effective Information Security Management. A quick review of the topics in this book look excellent. (I will be adding this to my personal library!)

Information Security Policies Made Easy, Version 8 (Comes with CD)
Charles Cresson Wood / Paperback / Pentasafe Security Technologies / May 2001

The E Policy Handbook: Designing and Implementing Effective E-Mail, Internet and Software Policies
Nancy L. Flynn / Paperback / AMACOM / November 2000

Information Security: Policies and Procedures: A Practitioner's Reference
Thomas R. Peltier / RINGBOUND / CRC Press, LLC / January 1999

Windows System Policies
Mark Wilkins / Paperback / McGraw-Hill Professional Book Group / October 1999

Computer Security Policies and SunScreen Firelines
Kathryn M. Walker, Linda Croswhite Cavanaugh / Paperback / Prentice Hall PTR / July 1998

Information Security Policies, Procedures and Standards: Guidelines For Effective Information Security Management
Thomas R. Peltier / Paperback / Auerbach Publishers, Incorporated
Will be released in December 2001


This was last published in October 2001

Dig Deeper on Information Security Policies, Procedures and Guidelines

PRO+

Content

Find more PRO+ content and other member only offers, here.

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close