Security Policies
This chapter is about security policies. I know it’s not an exciting topic, but it is mandatory in building a solid information security program. We will be discussing how security policies meet the laws and regulations that are required by your industry. We’ll cover the differences between policies, procedures, and guidelines. We’ll discuss the fact that following your security policies shows due diligence. Finally, we’ll discuss two major breaches and how policies played a role.
In this chapter, we’re going to cover the following main topics:
- Where are your policies, and are they being used?
- Compliance begins with laws and regulations
- Importance of due diligence