CSS L-5
CSS L-5
CSS L-5
Information security policies can have the following benefits for an organization:
A security policy can be as broad as you want it to be, from everything related to
IT security and the security of related physical assets, but enforceable in its full
scope. The following list offers some important considerations when developing
an information security policy.
1. Purpose
Define the audience to whom the information security policy applies. You may
also specify which audiences are out of the scope of the policy (for example, staff
in another business unit which manages security separately may not be in the
scope of the policy).
3. Information security objectives
The policy should classify data into categories, which may include “top secret,”
“secret,” “confidential,” and “public.” The objectives for classifying data are:
Share IT security policies with your staff. Conduct training sessions to inform
employees of your security procedures and mechanisms, including data
protection measures, access protection measures, and sensitive data classification.
A data backup policy defines rules and procedures for making backup copies of
data. It is an integral component of overall data protection, business continuity,
and disaster recovery strategy. Here are key functions of a data backup policy:
Appoint staff to carry out user access reviews, education, change management,
incident management, implementation, and periodic updates of the security
policy. Responsibilities should be clearly defined as part of the security policy.