Create a Security Assessment Policy Using Info-Tech's Template

John Storts
Slide Show

Top Security Threats for 2010

Perimeter CTO Kevin Prince's thoughts on the threats, both growing and persistent, facing your network.

In addition to last week's Network Security Policy for Portable Computers, Info-Tech Research Group just added another security-related policy template to the Knowledge Network. The Security Assessment Policy Template is designed to help IT managers determine whether information system security controls are correctly implemented, operating as intended and producing the desired level of security.


The template includes editable areas for adding policy owner, reviewer, storage location, review and effective date information. Other customizable sections include those for:


  • Defining the purpose of the policy.
  • Describing the policy scope.
  • Communicating policy and procedural details.
  • Outlining consequences of non-compliance.
  • Providing revision history.


After creating a policy, perform these assessments at regular intervals to minimize information system weaknesses and lessen the risk of a system breach.


Related Knowledge Network Content


.Colorado State University Information Technology Security Policy


.Information Security for End Users


.Job Description: Chief Security Officer

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.




Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.