Page 44 - CISSO_Prep_ Guide
P. 44

For that, you also  need  alignment with  business  priorities and
            senior management support (among other things like awareness
            training, excellent staff…), but the framework can help.





            Policy
            One of the priorities and deliverables of an information security
            program  should  be  the  creation  and  approval  of  information
            security policy. The plan is the core document that outlines the
            boundaries, objectives, and authority of the information security
            program. Without a plan signed by senior management, a security
            department lacks the credibility and authority to investigate or
            enforce security practices and principles.

            It is common for the security manager to have to write the policy
            and then send it out for review, adjustment, and finally, approval.
            The plan is approved by a senior manager (often the Managing
            Director or Chief Executive Officer) and then distributed to all
            areas  of  the  organization  that  it  applies  to.  A  policy  reflects
            management's intent and direction and mandates compliance with
            laws or standards.

            A policy document should be short, clear, and easily understood.
            It should be written in a way that is not technically constrained
            and would, therefore, be quickly outdated as technology changes.
            The Information Security policy must be legally enforceable and
            aligned  with  the  culture  of  the  organization  and  other
            organizational systems such as Human Resources and Health and
            Safety policies. The plan should have an owner that is responsible
            for annually reviewing  and updating the project when needed.
            Every  policy  should  allow  for  enforcement  and  disciplinary
   39   40   41   42   43   44   45   46   47   48   49