3

Security Policies and Business Continuity

This chapter covers security policies and business continuity (BC). For security policies, you will be learning about what purpose they serve, the characteristics of a good policy, and the information security policy life cycle. You will examine how to identify, analyze, and prioritize BC requirements. Further, you will explore the business impact analysis (BIA) process and its role in the overall BC effort. Finally, you will look into the business continuity plan (BCP) construction process. By the end of this chapter, you will be able answer questions on the following:

  • Developing, documenting, and implementing security policies, standards, procedures, and guidelines
  • Identifying, analyzing, and prioritizing ...

Get Certified Information Systems Security Professional (CISSP) Exam Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.