You learned in this chapter how to break up policies into seven domains. You examined each of the domains to learn why they exist, looked at related business concerns, and learned how to mitigate common risks. Security policies have to be aligned to the business. Most important, security policies can highlight regulatory and leading practice to guide the business in controlling these risks.

This chapter examined the changing nature of business through technologies such as wireless and handheld devices. You read about the differences between access methods such as RBAC and ABAC. It is important that security policies keep pace with changing technologies. You also saw what happens when security policies are not effective, ...

Get Security Policies and Implementation Issues, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.