IT Security Policy Development

Our experts, with over two decades of experience in the IT Security industry, provide custom IT security policies. Our team works with organizations to develop policies specific to IT Security controls and Standards.

A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network security realm, policies are usually point-specific, covering a single area. For example, an “Acceptable Use” policy would cover the rules and regulations for appropriate use of the computing facilities.

A standard is typically a collection of system-specific or procedural-specific requirements that must be met by everyone. For example, you might have a standard that describes how to harden a Windows 8.1 workstation for placement on an external (DMZ) network. People must follow this standard exactly if they wish to install a Windows 8.1 workstation on an external network segment. In addition, a standard can be a technology selection, e.g. Company Name uses Tenable SecurityCenter for continuous monitoring, and supporting policies and procedures define how it is used.

A guideline is typically a collection of system specific or procedural specific “suggestions” for best practice. They are not requirements to be met, but are strongly recommended. Effective security policies make frequent references to standards and guidelines that exist within an organization.

Just a few policies we can provide include;

  • Acceptable Use Policy
  • Password Policy
  • Backup Policy
  • Network Access Policy
  • Incident Response Policy
  • Remote Access Policy
  • Virtual Private Network (VPN)
  • PolicyGuest Access Policy
  • Wireless Policy
  • Third Party Connection Policy
  • Network Security Policy
  • Encryption Policy
  • Confidential Data Policy
  • Data Classification Policy
  • Mobile Device Policy
  • Retention Policy
  • Outsourcing Policy
  • Physical Security Policy