Chapter 2. Determining Your Policy Needs

NOW THAT WE KNOW WHAT SECURITY policies are and have the support of management, the next step is to understand exactly what is being protected. This understanding goes beyond the hardware and software that makes up the system. It is very important to understand the business process that the technology supports. Your policy could sit on the shelf collecting dust if it prevents the company from doing business.

Get Writing Information Security Policies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.