June 2007
Intermediate to advanced
720 pages
20h 39m
English
In the previous section, it is suggested that more than one document is necessary to communicate and implement security in your organization. One of those documents is an e-policy document. E-policies translate information security policies into specific, measurable objectives for your IT staff. Table 18-1 provides some examples.
Table 18-1. E-Policy Examples
Information security policy | Electronic policy |
|---|---|
Administrative and service account passwords must never be in a readable form outside the servers or a physically secure environment. | Administrative and service account passwords can never be written down unless such documentation is secured in the IT vault. Passwords can be read and communicated ... |