Need for an Information Security Policies

Reference: https://www.google.com/url?sa=i&url=https%3A%2F%2Flinfordco.com%2Fblog%2Finformation-security-policies%2F&psig=AOv
Security Policy Framework
  1. Application Security
  2. Infrastructure Security
  3. Cloud Security
  4. Cryptography
  5. Incident response
  6. Vulnerability management
  7. Disaster management and recovery
  1. Social Engineering attacks
  2. Distributed Denial of Service (DDoS)
  3. Man In The Middle (MiTM)
  4. Ransomware attacks
  5. Crypto-jacking
  6. Advance Persistent Attacks (APTs)
  1. Acceptable use guidelines for end-user
  2. Vendor management
  3. Guidelines on password requirements
  4. Allowance on personal devices and mobile
  5. Physical Security
  6. Data Classification & Retention
  7. Awareness training to all the users
  8. Data Security and Privacy regulations
  9. Standard measures for wireless networking
  10. Identity & access management

--

--

--

Antara is a passionate Information, Network Security Professional, Lead Auditor, and Cyber Security Researcher.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Get ready 🔸 Our #TelosTalks event with @Fortis_Coin CEO Jesus Sobredo happens tomorrow at 19:00…

v0.16 Migration Report — Week 1

[Notice] DUCATO HQ Announcement : 1st AMA response

After Watching the Social Dilemma, I Wonder: Can We Commoditize Trust?

Safe and Sound: Lossless Protocol will Protect BSC Station Ecosystem

{UPDATE} Stair Master! Hack Free Resources Generator

CertiK Officially Engaged to Audit Multi-Chain Lend

AMA with XDB Foundation Managing Director Michael Gord

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Antara Mane

Antara Mane

Antara is a passionate Information, Network Security Professional, Lead Auditor, and Cyber Security Researcher.

More from Medium

How do Red Team Exercises help CISO to Validate the Security Controls Effectively?

How to protect from Spring4Shell

Have we really been breached?

Offensive Security Proving Grounds Walk Through “Quackerjack”