CHAPTER 22Best Practice Security Policies: Objective 5.3 Understand Best Practice Security Policies
In Chapter 7, “Security Governance Processes,” you learned about the different types of documents that are created as part of the security policy framework. This chapter discusses the content of those policies. Every organization will need a different set of security policies, but there are some common themes found in most organizations.
In this chapter, you'll learn about CC objective 5.3. The following subobjectives are covered in this chapter:
- Data handling policy
- Password policy
- Acceptable Use Policy (AUP)
- Bring your own device (BYOD) policy
- Change management policy (e.g., documentation, approval, rollback)
- Privacy policy
ACCEPTABLE ...
Get CC Certified in Cybersecurity Study Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.