Security Policies - Manage your Risks

Security policies are documents developed and implemented by an organization to manage security related risks, meet business requirements, and comply with regulations.  Security policies specify the controls and actions to be performed (what needs to be done) and are approved by senior management to ensure the policies are in line with the organization's overall level of risk tolerance. 

Purpose

The main goal of security policies is to protect data by identifying procedures, guidelines and safeguards for configuring and managing security in the organization's environment. Security policies define the organization’s philosophy and requirements for securing information systems and related assets. They also outline how controls apply to staff, processes, and environments. Consequences for failed compliance with the policies are also addressed.

Security policies provide many benefits to organizations:

Risk Assessment

The first step when preparing security policies is to full identify assets and threats to the assets. 

Important IT assets can include network infrastructure components (firewalls, servers, data, storage, applications, important peripherals, etc.), staff (employees, consultants, temporary help, etc.), facilities (buildings, data centers), and security protection mechanisms (access control systems, locking cages, etc.).  Other important assets that should be identified include intellectual property and customer goodwill.

When assessing risks, consider both external and internal threats. External threats can include hackers, viruses, Denial of Service (DoS) attacks, collateral damage from terrorists, fires, and related risks. Internal threats include unauthorized use of systems, untrained staff, failure to follow procedures, lack of or insufficient security controls, etc.

Following the identification of assets and threats, the organization should perform a risk analysis that identifies the likelihood and impact of an event on the organization.  Consider the impact if the asset’s data, networks or systems are compromised. Also consider a security incident’s impact on the organization's credibility, reputation and relationships with stakeholders, customers, and business associates.

The risk assessment and risk analysis helps:

Effective Security Policies

Once the assets, threats, and impact on the organization have been identified, security policies are used to treat the risks.  Security policies are used to:

Seven key elements that should be included within each security policy include:

Once security policies are in place, procedures should be developed that specify specific actions to be taken (how something is to be done) to support the policies.  For example, the IT Department may have written procedures to harden a Windows server.

Recommended Security Policies

Security policies address access controls, patch management, monitoring systems, business continuity, compliance, and many other areas. The following is a minimum list of recommended security policies for small organizations.  Medium and large organizations face greater risks and need more extensive policies and controls.

Security protection policies

Risk management policies

Network security policies

A security policy collection includes templates that provide an organization a quick, cost effective, and easy way to manage security related risks, meet business requirements, and comply with regulations.

Security Blog
verified If You Want a "Security Audit"
You Need a Certified Auditor.
Certified Information Systems Auditors

Unlike a security consultant, Altius IT is certified as a Certified Information Systems Auditor to perform a security audit of your environment and issue reports and recommendations to secure your systems. After your audit, Altius IT's Auditor Opinion Letter and Secure Seal let your clients and prospects know you meet security best practice/compliance requirements.

See our In the News page for video clips of our experts on national television as well as over 40 publications featuring Altius IT. In addition to our auditor certifications we hold many security, technical, and project management credentials. More information is available on our About Us page.

Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your information systems, applications, and network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets