Picture
SEARCH
What are you looking for?
Need help finding what you are looking for? Contact Us
Compare

PUBLISHER: IDC | PRODUCT CODE: 1465250

Cover Image

PUBLISHER: IDC | PRODUCT CODE: 1465250

Best Practices for Planning, Developing, and Managing Enterprise Security Policies

PUBLISHED:
PAGES: 8 Pages
DELIVERY TIME: 1-2 business days
SELECT AN OPTION
PDF (Single User License)
USD 7500

Add to Cart

This IDC Perspective walks businesses through the steps necessary for establishing a successful security policy strategy. Security policies should provide the foundation for meaningful action in mitigating cybersecurity and compliance challenges of all types based on the level of risk that an organization deems tolerable. In addition, by detecting mismatches between their policies and actual practices, businesses can identify potentially serious risks that require correction.However, security policies fail to support these goals when they suffer from problems like lack of actionability, failure to address risks comprehensively, and lack of awareness of policies across the organization.To mitigate these challenges and create policies that drive meaningful action, enterprises require a coherent strategy that addresses all stages of the policy life cycle, from initial policy development and review to policy dissemination and ongoing updates."For effective security policy development, promulgation, and maintenance, having a systematic process in place is key," says Chris Tozzi, adjunct research advisor for IDC's IT Executive Programs (IEP). "And so is identifying the various stakeholders in security policy management and ensuring that you plug them into your processes."

Product Code: US51827724

Executive Snapshot

Situation Overview

  • What Are Security Policies?
  • Security Policies Versus Security Procedures
  • Why Are Security Policies Important?
  • Security Policy Challenges
    • Ambiguous Requirements
    • Technology Changes
    • Diverse Stakeholders
    • Lack of Policy Buy-In
    • Policy Bloat and Sprawl

Advice for the Technology Buyer

  • Base Policies on Compliance Mandates - But Be Flexible
  • Use Policy Templates - But Only as a Starting Point
  • Consult with Regulators and Auditors
  • Consider Your Capabilities
  • Assign Responsibility for Policy Creation
  • Define a Policy Review Process
  • Define a Plan for Policy Dissemination
  • Establish Regular Policy Assessments and Gap Analysis

Learn More

  • Related Research
  • Synopsis
Have a question?
Picture

Jeroen Van Heghe

Manager - EMEA

+32-2-535-7543

Picture

Christine Sirois

Manager - Americas

+1-860-674-8796

Questions? Please give us a call or visit the contact form.
Hi, how can we help?
Contact us!