Security Policy Implementation Guide

Author(s): James Quin

1 Download

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.

Implementing a corporate Security Policy can be a complicated and potentially arduous task. Many changes will have to be made to the enterprise, some great, some small, and all with different levels of security and user impact as well as cost and effort requirements. Understanding which changes to make in what order is essential for achieving the most efficient implementation. This tool will help determine that structure in the following manner:

  • The company will establish its over-arching rankings for the four listed factors (security impact, user impact, effort required, cost required).
  • The company will list all changes to be made as a result of the policy implementation.
  • The company will indicate whether, in its opinion each change has a high, average, or low impact in each of the four factors.

This process will create a customized ranking of changes for each organization. Implementing according to these rankings allows the enterprise to most efficiently achieve its security goals.

 

This downloadable tool is associated with the research note, "Four Steps for Implementing a Security Policy."

Related Content

Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019