- Information Security Handbook
- Darren Death
- 126字
- 2021-07-02 21:55:55
Planning policy
A planning policy in this context has to do with developing the information security program. This policy sets the foundation for an organization's information security program and is one of the initial activities that should be undertaken when an organization is beginning to mature its information security capability. Additionally, this policy establishes rules around the development, documentation, periodic update, and implementation of security plans for organizational information systems.
A planning policy should address:
- The establishment of organizational roles—CIO, CISO, system owner, data owner, data custodian, and so on
- What should be included and what should the update frequency be for the information security program plan?
- What artifacts should be developed to ensure repeatable processes around information security control selection, development, and implementation?
推薦閱讀
- Mastering Proxmox(Third Edition)
- 大數(shù)據(jù)專業(yè)英語
- Visual Basic從初學(xué)到精通
- Supervised Machine Learning with Python
- Visual C++編程全能詞典
- Storm應(yīng)用實(shí)踐:實(shí)時事務(wù)處理之策略
- 傳感器與新聞
- Excel 2007技巧大全
- Excel 2010函數(shù)與公式速查手冊
- 工業(yè)自動化技術(shù)實(shí)訓(xùn)指導(dǎo)
- 基于Proteus的單片機(jī)應(yīng)用技術(shù)
- 智能制造系統(tǒng)及關(guān)鍵使能技術(shù)
- 筆記本電腦維修之電路分析基礎(chǔ)
- Creating ELearning Games with Unity
- FreeCAD [How-to]