InfoSec Policies and Standards: Some strategic context for those just diving into this world
CTOvision
MAY 22, 2014
There should also be a mechanism to report any violations to the policy. How incidents are reported and investigated. Firewall Policy. How firewalls are named, configured etc. Legal experts need to be consulted if you want to know what level of encryption is allowed in an area. Wireless Policy. Backup Policy.
Let's personalize your content