Process—Components

Depending upon the size and complexity of your organization, you might have many information security policies. However, to have an effective information security program, all companies must address a few basic areas:

  • Account administration— This is one of the most important policies, and it dictates how your organization grants access to key systems within the company. Controlling logical access to your company's information technology assets is the foundation of a successful security program.

  • Remote access— Most personnel need to gain access to systems such as email when they are not in the office. Your remote access policy addresses this and prescribes the steps that staff must take to protect your systems when accessing ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.