Security Policies and Business Continuity
This chapter covers security policies and business continuity (BC). For security policies, you will be learning about what purpose they serve, the characteristics of a good policy, and the information security policy life cycle. You will examine how to identify, analyze, and prioritize BC requirements. Further, you will explore the business impact analysis (BIA) process and its role in the overall BC effort. Finally, you will look into the business continuity plan (BCP) construction process. By the end of this chapter, you will be able answer questions on the following:
- Developing, documenting, and implementing security policies, standards, procedures, and guidelines
- Identifying, analyzing, and prioritizing BC requirements
- BIA
- Developing and documenting the scope and the plan
- Contributing to and enforcing personnel security policies and procedures
- Candidate screening and hiring
- Employment agreements and policies...