Our Recommendations :-
Follow CA Final FB Page

What are the key components of a good security policy?

Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Anil Dhawan asked over 2 years ago

    0       0 Answer Now Comment Report
3 Answers
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 ranjan bhutani answered about 2 years ago

A good security policy should clearly state the following: •Purpose and Scope of the Document and the intended audience; •The Security Infrastructure; •Security policy document maintenance and compliance requirements; •Incident response mechanism and incident reporting; •Security organization Structure; •Inventory and Classification of assets; •Description of technologies and computing structure; •Physical and Environmental Security; •Identity Management and access control; •IT Operations management; •IT Communications; •System Development and Maintenance Controls; •Business Continuity Planning; •Legal Compliance

    0       0 Comment Report
Important Note – Preparing for CA Final?
CAKART provides Indias top faculty each subject video classes and lectures – online & in Pen Drive/ DVD – at very cost effective rates. Get video classes from CAKART.in. Quality is much better than local tuition, so results are much better.
Watch Sample Video Now by clicking on the link(s) below – 
For any questions Request A Call Back  
Open uri20170510 32134 59004f?1494421790 Anshul Dhawan answered over 2 years ago

A good security policy should clearly state the following: •Purpose and Scope of the Document and the intended audience; •The Security Infrastructure; •Security policy document maintenance and compliance requirements; •Incident response mechanism and incident reporting; •Security organization Structure; •Inventory and Classification of assets; •Description of technologies and computing structure; •Physical and Environmental Security; •Identity Management and access control; •IT Operations management; •IT Communications; •System Development and Maintenance Controls; •Business Continuity Planning.

    0       0 Comment Report
Avatar 37a3bd7bc7328f0ead2c0f6f635dddf60615e676e6b4ddf964144012e529de45 Chirag answered over 2 years ago

A good security policy should clearly state the following: •Purpose and Scope of the Document and the intended audience; •The Security Infrastructure; •Security policy document maintenance and compliance requirements; •Incident response mechanism and incident reporting; •Security organization Structure; •Inventory and Classification of assets; •Description of technologies and computing structure; •Physical and Environmental Security; •Identity Management and access control; •IT Operations management; •IT Communications; •System Development and Maintenance Controls; •Business Continuity Planning; •Legal Compliance; and •Monitoring and Auditing Requirements.

    0       0 Comment Report
Get Notifications
Videos
Books
Notes
Loading
SIGN UP
Watch best faculty demo video classes

These top faculty video lectures will
help u prepare like nothing else can.