14.3. Policies and Procedures

Every company should have written policies to effectively enable security on their computer networks. These policies should have the approval of the highest-ranking security or IT officer within the company, and they should address all aspects of the company network. Procedures should also be in place to determine the appropriate course of action in the event that there is a security breach. And all network administrators absolutely need to be thoroughly trained on all policies and procedures—no weak links.

All of this might sound a bit militaristic in nature, but it's truly necessary. Speaking of the military, though, the U.S. Department of Defense (DoD) has some really good standards that it wouldn't hurt you ...

Get CompTIA Network+® Study Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.