Six Easy Pieces: A Guide to Security Policy Implementation

Author(s): James Quin

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

The topic of security policy creation is one that has been widely addressed. As such, it should be thoroughly understood and accepted that every enterprise needs such a document. Given that no security improvements will be realized until the policy is actually implemented, companies need to also focus on building a clear and strong plan for bringing the policy to life.

Implementation in Six Steps or Less

The issue of policy implementation is often poorly addressed because it seems too complicated. Breaking the process down into a series of inter-linked steps will allow the enterprise to tackle the project phase by phase. This will reduce the overall focus, resource and time commitment. The six steps are as follows:

  1. Obtain Management Acceptance
  2. Assess the Impacts
  3. Create a Detailed Plan
  4. Perform Training
  5. Change Existing Systems
  6. Implement New Solutions

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019