IT Examiner School
Security Procedures: The “How”
• Step by step process for implementation • Establish roles & responsibility “Accountability” • Event driven • Volatile, change frequently • The “how-to” manual of security compliance
Security Policy
Security Policy Summary
• Policy drives technology • Increases cost-effectiveness • Provide guidelines for uncertain scenarios • Consistency • Change management • The basis for IT Audit compliance
52
Made with FlippingBook Digital Publishing Software