Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 140: Line 140:


:1. be consistent with the information security policy;
:1. be consistent with the information security policy;
:2. be measurable (if practicable);
:2. be measurable (if practicable);
:3. take into account applicable information security requirements, and results from risk assessment and risk treatment;
:3. take into account applicable information security requirements, and results from risk assessment and risk treatment;
:4. be communicated; and
:4. be communicated; and
:5. be updated as appropriate.
:5. be updated as appropriate.


Line 152: Line 148:


:6. what will be done;
:6. what will be done;
:7. what resources will be required;
:7. what resources will be required;
:8. who will be responsible;
:8. who will be responsible;
:9. when it will be completed; and
:9. when it will be completed; and
:10. how the results will be evaluated.
:10. how the results will be evaluated.