security policies, baseline standards, baseline security, security standards, security policy

Security Policies & Baseline Standards:
Effective Deployment and Implementation


Security policies and baseline security standards underpin the security of your information and your organization. It is extremely important therefore that they are not only of excellent quality, but that they are effectively implemented.


INFORMATION SECURITY POLICIES SOURCE
The first step of course is to ensure that you actually have an appropriate set of information security policies.

If not, the good news is that you can now obtain a comprehensive and flexible set of hundreds of 17799 aligned information security policies off the shelf. Additionally, these can also be tailored to meet specific or individual needs, and are shipped in several formats.



POLICY IMPLEMENTATION
Having a security policy document in itself, however, is only half the story.... the contents MUST be implemented to be effective. Sadly, this is often easier said than done!

Your security policy will be comprehensive in its coverage of security issues. It will contain a substantial number of control requirements and specifications, some of which could well be extremely complex. Compliance with this and implementation is therefore a far from trivial exercise, even for the most security conscious of organizations and enterprises.

It is recommended therefore that your security policy is approached in a step by step manner. The best starting point is often an assessment of the current position and situation, followed by identification of what changes are actually needed for compliance. From here, planning and implementing must be undertaken and performed.

This web site is intended to assist with this project. The following pages will provide further information, as well as suggesting a solution to help guide you to full compliance:

security policies, baseline standards, baseline security, security standards, security policy Compliance Strategy

How to approach the Compliance issue.

security policies, baseline standards, baseline security, security standards, security policy A Proven Solution

Details of the COBRA methodology and tool (including downloadable trial copy).


Hopefully, the above pages will prove to be an invaluable source of information. If, however, you need any further assistance or advice, please do not hesitate to contact us.

web Web Links web

Links to risk related information on the Web.


Copyright C&A; Systems Security Ltd Email Us
Recip Link