Problem solve Get help with specific problems with your technologies, process and projects.

Issues to cover in a security policy

A short look at the ten areas of concern for an organization's security policy.

 

Issues to cover in a security policy
James Michael Stewart

The security policy of an organization drives the entire structure of physical, administrative and technical security deployed. Without a thorough security policy defining what should be done, the results of the haphazard deployment of security controls will be woefully insufficient.

There are at least ten areas of concern that an organization's security policy should address. I've borrowed these ten areas from the CISSP Common Body of Knowledge (CBK). The CISSP or Certified Information Systems Security Professional is a security certification offered by (ISC)2 (www.isc2.org). Even if you don't want to pursue the certification, I highly recommend reviewing the CBK assembled for this exam.

The ten areas are:

  1. Access Control Systems & Methodology
  2. Applications & Systems Development
  3. Business Continuity Planning
  4. Cryptography
  5. Law, Investigation & Ethics
  6. Operations Security
  7. Physical Security
  8. Security Architecture & Models
  9. Security Management Practices
  10. Telecommunications, Network & Internet Security

Your security policy should address each of these areas specifically and distinctly. Otherwise, your policy is incomplete and the resultant security scheme deployed by your organization probably has significant gaps that can be exploited.

About the author
James Michael Stewart is a researcher and writer for Lanwrights, Inc.


This was last published in April 2002

Dig Deeper on Information security policies, procedures and guidelines

PRO+

Content

Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...

Close