Guidelines for building security policies

Last Updated: March 23, 2023
Format: PDF

PURPOSE
These guidelines from TechRepublic Premium will help you define the necessary ingredients of a security policy and assist in its proper construction. They’re designed to work hand in hand with the subjective knowledge you have of your company, environment and employees. Using this information, your business can establish new policies or elaborate on those you already have in place.

From the guidelines:

ITEMS TO COVER IN A SECURITY POLICY

You should approach a security policy as if it were an umbrella and make sure it covers all aspects of information and/or systems used in your organization. Start with software, then move on to hardware, and finally cover services or processes.

SOFTWARE EXAMPLES INCLUDE:

  • Local client-based packages (Microsoft Office, OpenOffice and Dropbox).
  • Operating systems (Windows OS, Linux OS and macOS).
  • Server-based programs (Active Directory, QuickBooks and Microsoft Exchange).

HARDWARE EXAMPLES INCLUDE:

  • End-user hardware (Desktops, laptops and mobile devices).
  • Infrastructure hardware (Servers, switches, firewalls, wireless access points and routers).
  • Subscribe to the TechRepublic Premium Exclusives Newsletter

    Save time with the latest TechRepublic Premium downloads, including customizable IT & HR policy templates, glossaries, hiring kits, features, event coverage, and more. Exclusively for you! Delivered Tuesdays and Thursdays.

    Subscribe to the TechRepublic Premium Exclusives Newsletter

    Save time with the latest TechRepublic Premium downloads, including customizable IT & HR policy templates, glossaries, hiring kits, features, event coverage, and more. Exclusively for you! Delivered Tuesdays and Thursdays.