Security Policy Management

In order to effectively have security compliance management in an organization, controls, policies, standards must be established. To establish these a risk assessment must be performed to understand what risks are present. The risks identified translate to areas where controls must identified, designed and test to validate risk mitigation results from putting the control place.

To ensure your organization has governance to maintain the awareness of the control, policies and standards are developed. Some of these policies for information security often may include a:

  • Access Control Policy
  • Commercial Email Policy
  • Data Classification Policy
  • Removable Media Policy
  • Endpoint Security Policy
  • Information Security Policy
  • Network Security Policy
  • Vulnerability Management Policy
  • … and much more!

One of the key differences in a policy versus a standard versus a control is the use of one of two verbs: SHALL or MUST. The reasoning for using one of these two verbs is policies serve as governance for an organization.

Within these policies, each policy must have the following:

  • The background to the policy, commonly known as the introduction;
  • The scope to which the policy applies (remember this is a governance document);
  • The approvals of when and by whom the policy was approved;
  • The action that needs to be taken if a policy cannot be followed; and
  • The consequence for non-compliance.

Gilliam Security has designed a set of policies that can serve as a template for your organization to build from. As part of this service, we provide multiple options to help your organization.

Reach out to us on the Contact Us page (link) and we can start helping you today. We look forward to hearing from you!