Best Practices for IT Security Policy Implementations

A proper implementation process educates, creates support, and integrates the policy into day-to-day operations. Having a standard process approach that ensures that business risks, compliance, and threat vectors are considered in all policy changes is a best practice.

The goal of employee awareness and training is to ensure that individuals have the knowledge and skills needed to implement security policies. The primary objective of a security awareness program is to educate users. Creating awareness should be an ongoing effort that reinforces key security concepts. The awareness component is important because it sets the tone and goals for security policy implementation.

In writing policy, don’t use imprecise language such as “should” or “expected.” Assign clear accountability to specific roles. Specify precisely which resources are covered by the policy. Avoid requiring specific technologies in a policy.

As noted earlier, implementing a security policy is much more than simply writing and publishing a document. In fact, writing and publishing a policy document is but a small part of a larger process. Creating an IT security policy is less about the document and more about the control environment the policy creates. A policy is a means of implementing a control—such as a way to prevent or detect a specific type of security breach. So simply publishing a policy in itself doesn’t prevent or detect a security breach. The policy implementation must be a series of steps that ensure that the policy is put into practice. The following sources can be of help:

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.140.68