Difference between revisions of "Security policy"
Jump to navigation
Jump to search
↑ https://www.giac.org/paper/gsec/1691/good-security-policy-necessary/103074
Tags: Mobile web edit, Mobile edit |
|||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
{{Draft}} | {{Draft}} | ||
+ | [[wikipedia:Security policy]] | ||
+ | |||
According to [[SANS]] Institute the most important factor in a security policy is that it must be usable. It should be concise, clearly written and as detailed as possible in order to provide the information necessary to implement the regulation. <ref>https://www.giac.org/paper/gsec/1691/good-security-policy-necessary/103074</ref> | According to [[SANS]] Institute the most important factor in a security policy is that it must be usable. It should be concise, clearly written and as detailed as possible in order to provide the information necessary to implement the regulation. <ref>https://www.giac.org/paper/gsec/1691/good-security-policy-necessary/103074</ref> | ||
− | + | == Related == | |
+ | * [[Principle of least privilege (PoLP)]] | ||
== See also == | == See also == |
Latest revision as of 08:21, 7 February 2022
This article is a Draft. Help us to complete it.
According to SANS Institute the most important factor in a security policy is that it must be usable. It should be concise, clearly written and as detailed as possible in order to provide the information necessary to implement the regulation. [1]
Related[edit]
See also[edit]
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: