Issues to cover in a security policy


Issues to cover in a security policy
James Michael Stewart

The security policy of an organization drives the entire structure of physical, administrative and technical security deployed. Without a thorough security policy defining what should be done, the results of the haphazard deployment of security controls will be woefully insufficient.

There are at least ten areas of concern that an organization's security policy should address. I've borrowed these ten areas from the CISSP Common Body of Knowledge (CBK). The CISSP or Certified Information Systems Security Professional is a security certification offered by (ISC)2 (

    Requires Free Membership to View

www.isc2.org). Even if you don't want to pursue the certification, I highly recommend reviewing the CBK assembled for this exam.

The ten areas are:

  1. Access Control Systems & Methodology
  2. Applications & Systems Development
  3. Business Continuity Planning
  4. Cryptography
  5. Law, Investigation & Ethics
  6. Operations Security
  7. Physical Security
  8. Security Architecture & Models
  9. Security Management Practices
  10. Telecommunications, Network & Internet Security

Your security policy should address each of these areas specifically and distinctly. Otherwise, your policy is incomplete and the resultant security scheme deployed by your organization probably has significant gaps that can be exploited.

About the author
James Michael Stewart is a researcher and writer for Lanwrights, Inc.

This was first published in April 2002

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.