Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

Implementing a corporate Security Policy can be a complicated and potentially arduous task. Many changes will have to be made to the enterprise, some great and some small and all with different levels of security and user impact as well as cost and effort requirements. Understanding which changes to make in what order is essential for achieving the most efficient implementation. This tool will help determine that structure in the following manner:

  • The company will establish its over-arching rankings for the four listed factors (security impact, user impact, effort required, cost required).
  • The company will list all changes to be made as a result of the policy implementation.
  • The company will indicate whether each change has a high, average, or low impact in each of the four factors.

This process will create a customized ranking of changes for each organization. Implementing according to these rankings allows the enterprise to most efficiently achieve its security goals.


This downloadable tool is associated with the research note, "You've Got a Security Policy. Now What?"

Related Content

Hide Details

Search Code: 8944
Published: January 3, 2007
Last Revised: January 3, 2007


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.