Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.

The topic of security policy creation is one that has been widely addressed. As such, it should be thoroughly understood and accepted that every enterprise needs such a document. Given that no security improvements will be realized until the policy is actually implemented, companies need to also focus on building a clear and strong plan for bringing the policy to life.

Implementation in Six Steps or Less

The issue of policy implementation is often poorly addressed because it seems too complicated. Breaking the process down into a series of inter-linked steps will allow the enterprise to tackle the project phase by phase. This will reduce the overall focus, resource and time commitment. The six steps are as follows:

  1. Obtain Management Acceptance
  2. Assess the Impacts
  3. Create a Detailed Plan
  4. Perform Training
  5. Change Existing Systems
  6. Implement New Solutions

Related Content

Hide Details

Search Code: 7496
Published: January 16, 2007
Last Revised: January 16, 2007


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.