Q
Problem solve Get help with specific problems with your technologies, process and projects.

Creating security policies for an enterprise customer

SearchSecurityChannel expert Felicia Wetter offers advice on creating security policies for an enterprise customer, whether you're starting from scratch or have loosely defined policies to start with.

I'm a security consultant with an enterprise customer in dire need of security policies. What is the best way to approach this situation? Should I present a template policy to them and, with their input, tweak it to suit their environment? Or should I start from scratch?

There are a plethora of resources available to assist you and your customer in creating security policies that meet their needs and requirements. The best way to approach the situation is to first assess the situation; do they have any policies in place today? If so, can they be leveraged to create a more well-rounded set of security policies? If they do not, then what policies are they looking to create, and is there a standard or set of policies they are specifically interested in? Two approaches at this point are possible. You can either begin with the common security policies, such as Internet Use, Password Management, Remote Access, etc., or you can start with a standard, such as ISO17799 and develop the policies based on this.

Once you have determined where to begin and have developed a preliminary set of policy topics, it is time to add the content. Determine what they have in place, for example, on password requirements, and create a policy based on what they are practicing today. Once you have the baseline policy, if they feel they can add more stringent requirements, they should then be added, but only if the customer is willing to increase the level of security practices. The security policies must be 'achievable' by your customer. Do not recommend security policies that they can never comply with.

The next part will be getting the policies approved and implemented. This can often times be the most difficult part. Make sure that a security policy committee is created, and use that committee for the creation of the security policies. Members should be comprised of all departments within the organization. The committee should be ultimately responsible for approving the policies, as they will ensure employees are complying with them after they are implemented.

Dig Deeper on Cybersecurity risk assessment and management

Have a question for an expert?

Please add a title for your question

Get answers from a TechTarget expert on whatever's puzzling you.

You will be able to add details on the next page.

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close