IT Examiner School

Security Procedures: The “How”

• Step by step process for implementation • Establish roles & responsibility “Accountability” • Event driven • Volatile, change frequently • The “how-to” manual of security compliance

Security Policy

Security Policy Summary

• Policy drives technology • Increases cost-effectiveness • Provide guidelines for uncertain scenarios • Consistency • Change management • The basis for IT Audit compliance

52

Made with FlippingBook Digital Publishing Software