Multi-dimensional enterprise-wide security: An action plan

Learn how to protect information assets and resources within all areas of the enterprise and in compliance with all regulatory, policy and contractual requirements.

This tip is excerpted from Chapter 3 of The Definitive Guide to Security Inside the Perimeter, written by Rebecca Herold and published by Read the entire e-book for free.

Dividing and distributing the information security responsibilities throughout the entire enterprise can accomplish simplification of complexity. One way to do so is by implementing the following:

  • Assign overall responsibility for enterprise information security oversight.
  • Establish an information security oversight board consisting of management representatives from each business unit and corporate functional office.
  • Assign responsibilities for each of the governance categories:
    • Education through training and awareness
    • Regulatory and legal requirements
    • Audit and validation
    • Policies procedures and standards
  • Assign responsibilities to representatives from each corporate and business unit for each of the security dimensions:
  • Connection Points
    • Endpoints
    • Internet
    • Wireless
    • Dial-In
  • End users
    • Employees
    • Customers and consumers
    • Business partners
    • Contractors and consultants
  • Processing and storage
    • Mobile devices
    • Transmission channels
    • Mainframes
    • Applications
    • Servers
    • Backup media


      Protection strategies
      Risk assessment and analysis methodologies
      Define risks
      The goal of an information security policy
      Due diligence
      Corporate reputation
      Audit and validation
      Simplifying complexity
      Divide and conquer
      An action plan

    Rebecca Herold is currently an information privacy, security and compliance consultant, author and instructor with her own company, Rebecca Herold, LLC. Rebecca has provided information security, privacy and regulatory services to organizations from a wide range of industries. She has over 15 years of information privacy, security and compliance experience. Rebecca was instrumental in building the information security and privacy program while at Principal Financial Group, which was awarded the 1998 CSI Information Security Program of the Year Award.
This was last published in January 2006

Dig Deeper on Information security policies, procedures and guidelines