Security Policies & Baseline Standards:
Effective Deployment and Implementation
Security policies and baseline security standards underpin the security of your information and your organization. It is extremely important therefore that they are not only of excellent quality, but that they are effectively implemented.
INFORMATION SECURITY POLICIES SOURCE
The first step of course is to ensure that you actually have an appropriate set of information security policies.If not, the good news is that you can now obtain a comprehensive and flexible set of hundreds of 17799 aligned information security policies off the shelf. Additionally, these can also be tailored to meet specific or individual needs, and are shipped in several formats.
- Information Security Policies
These policies are particularly comprehensive and are entirely customisable.
Each policy is explained and cross referenced with ISO17799.
At only $US 595 for unlimited use within your organization they represent outstanding value.
POLICY IMPLEMENTATION
Having a security policy document in itself, however, is only half the story.... the contents MUST be implemented to be effective. Sadly, this is often easier said than done!Your security policy will be comprehensive in its coverage of security issues. It will contain a substantial number of control requirements and specifications, some of which could well be extremely complex. Compliance with this and implementation is therefore a far from trivial exercise, even for the most security conscious of organizations and enterprises.
It is recommended therefore that your security policy is approached in a step by step manner. The best starting point is often an assessment of the current position and situation, followed by identification of what changes are actually needed for compliance. From here, planning and implementing must be undertaken and performed.
This web site is intended to assist with this project. The following pages will provide further information, as well as suggesting a solution to help guide you to full compliance:
Compliance Strategy
How to approach the Compliance issue.
A Proven Solution
Details of the COBRA methodology and tool (including downloadable trial copy).
Hopefully, the above pages will prove to be an invaluable source of information. If, however, you need any further assistance or advice, please do not hesitate to contact us.Web Links
Links to risk related information on the Web.
Copyright © C&A; Systems Security Ltd Email Us
Recip Link