© obpcnh/Shutterstock

IT Security Policy Implementations

CHAPTER
13

INFORMATION SECURITY POLICIES are the foundation upon which you build good security habits. IT security policies define what business and technology risks will be controlled and how they will be controlled. Users can turn to policies for guidance in their daily work. Policies are a useful tool for creating a risk culture that protects information. Policies are also part of the artifacts that are examined in any audit. The adoption and effective implementation of these policies are evidence to regulators, customers, and shareholders that due care is being taken to protect the company and its customers’ personal information. The stakes are high. Well-implemented security policies build brand confidence and help an organization achieve its goals. Poorly implemented security policies lead to breaches, fines, and damage to brand value, and they undermine confidence in the organization.

Everyone must follow the policies if they are to be effective. A security policy implementation needs user acceptance to be successful. Absent user acceptance, the policies may not be implemented consistently. They may sometimes be seen as optional. You can gain user acceptance, in part, by effectively communicating policies that are also easy to understand. A security awareness program, in addition to other methods, helps users understand policies and why they’re important. The implementation of security policies also requires management support. Thorough planning allows you to overcome challenges and gain that support.

This chapter examines a simple process approach to implementing IT security policies. It walks you through this high-level process and explores the major issues encountered while implementing security policies. You will read how to overcome challenges and the importance of a communication plan. The chapter also examines best practices for implementing security policies. Finally, the chapter presents case studies that reinforce important topics and concepts.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.218.199.14