Skip to Main Content
Information Security Policy Development for Compliance
book

Information Security Policy Development for Compliance

by Barry L. Williams
April 2016
Intermediate to advanced content levelIntermediate to advanced
152 pages
4h 9m
English
Auerbach Publications
Content preview from Information Security Policy Development for Compliance
67
InformatIon SecurIty PolIcy DeveloPment for comPlIance
a. Formal, documented security assessment and authorization
policies that address purpose, scope, roles, responsibilities,
management commitment, coordination among organiza-
tional entities, and compliance; and
b. Formal, documented procedures to facilitate the implementa-
tion of the security assessment and authorization policies and
associated security assessment and authorization controls.
CA-2 SECURITY ASSESSMENTS
Control: e organization:
a. Dev
elops a security assessment plan that describes the scope
of the assessment including:
Sec
urity controls and control enhancements under assess-
ment;
Ass
essment procedures to be used to determine security
control eectiveness; ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Writing Information Security Policies

Writing Information Security Policies

Scott Barman

Publisher Resources

ISBN: 9781466580589