Security policy is a set of rules enforced by an organisation
such that people of the organisation abide the rules regarding the
security policies within the organisation.
Elements of security policy are :
- Purpose : Purpose refers to the approach of
establishing a general approach to security.
- Scope :Scope must be to provide a solution
that addresses all data programs, systems and facilities.
- Security Objectives : The security objectives
includes major three aspects i.e. confidentiality, integrity and
availability of resources.
- Authority and access control policy : Security
policy has a hierarchical pattern, a senior manager has enough
authority to make a decision what data can be shared and with whom
where as a staff at lower level has limited authority.
- Classification of resources : The resources
can be classified as highly confidential, confidential and public
resources. Accordingly the security and access of resources must be
planned.
- Resource support and recovery : A strong
resource recovery system must be designed with good backup
capabilities in-order to prevent loss of data.
- Security Awareness :Security awareness must be
spread amongst the employees of the organisation via seminars or
training programs.
- Responsibilities and Duties : The employee of
the organisation must be made aware and responsible for their
loyalty and duties to ensure the protection of resources of the
organisation by abiding security policies of the organisation.
Implementation of effective resource planning can
address critical issues such as :
- Control the access of data , network and application amongst
the organisation employees
- The correct allocation of resources for organising events such
as training, awareness etc.
- Formulation of rules stating the acceptable use of data for
it's employees
- Decide and divide the responsibilities of management , resource
owner and user
- Planning of steps that can be taken in-order to prevent data
from third party sources
- The level of security resources must be allocated and the
privacy expectations to be satisfied
- Consequences of violation of policies