- Information Security Handbook
- Darren Death
- 126字
- 2021-07-02 21:55:55
Planning policy
A planning policy in this context has to do with developing the information security program. This policy sets the foundation for an organization's information security program and is one of the initial activities that should be undertaken when an organization is beginning to mature its information security capability. Additionally, this policy establishes rules around the development, documentation, periodic update, and implementation of security plans for organizational information systems.
A planning policy should address:
- The establishment of organizational roles—CIO, CISO, system owner, data owner, data custodian, and so on
- What should be included and what should the update frequency be for the information security program plan?
- What artifacts should be developed to ensure repeatable processes around information security control selection, development, and implementation?
推薦閱讀
- 電氣自動化專業英語(第3版)
- Learning Apache Spark 2
- Cloud Analytics with Microsoft Azure
- Learning Apache Cassandra(Second Edition)
- Google App Inventor
- 電腦主板現場維修實錄
- Lightning Fast Animation in Element 3D
- Machine Learning with Apache Spark Quick Start Guide
- 悟透AutoCAD 2009案例自學手冊
- RedHat Linux用戶基礎
- 中國戰略性新興產業研究與發展·增材制造
- INSTANT Heat Maps in R:How-to
- 從零開始學SQL Server
- AI的25種可能
- Visual Basic項目開發案例精粹