Security policy
Jump to navigation
Jump to search
↑ https://www.giac.org/paper/gsec/1691/good-security-policy-necessary/103074
This article is a Draft. Help us to complete it.
According to SANS Institute the most important factor in a security policy is that it must be usable. It should be concise, clearly written and as detailed as possible in order to provide the information necessary to implement the regulation. [1]
Related[edit]
See also[edit]
- Security: Security portfolio, Security standards, Hardening, CVE, CWE, Wireless Network Hacking, vulnerability scanner, Security risk assessment, SCA, Application Security Testing, OWASP, Data leak, NIST, SANS, MITRE, Security policy, Access Control attacks, password policy, password cracking, Password manager, MFA, OTP, UTF, Firewall, DoS, Software bugs, MITM, Certified Ethical Hacker (CEH) Contents, Security+ Malware, FIPS, DLP, Network Access Control (NAC), VAPT, SIEM, EDR, SOC, pentest, PTaaS, Clickjacking, MobSF, Janus vulnerability, Back Orifice, Backdoor, CSO, CSPM, PoLP, forensic, encryption, Keylogger, Pwn2Own, CISO, Prototype pollution
Advertising: