Policy
- 1
- Acceptable Use Policy Report
- A report on Acceptable Usage Policy, including what corporations expect of it, a case study, and a framework for creating your own policy.
- 2
- Building and Implementing a Successful Information Security Policy
- A white paper providing the reader with new and innovative aspects on the process of building a Security Policy, as well as managing a Security Awareness Program. [PDF]
- 3
- Canada's Export Controls
- Unofficial / unverified article describing Canada's export controls on cryptographic software.
- 4
- CobiT User Group
- International user group and hub for CobiT, the emerging IT control and security methodology.
- 5
- Do you have an intrusion detection response plan?
- Discussion of what should go into the creation of an intrusion detection plan and the expected results.
- 6
- How to Develop Good Security Policies and Tips on Assessment and Enforcement
- [Word Document] Invest the time up front to carefully develop sound policies and then identify ways to gauge their effectiveness and assess the level of compliance within your organization. Commit to spending the time and resources required to ensure that the policies are kept current and accurately reflect your company's security posture.
- 7
- IT Security Cookbook
- A guide to computer and network security with a strong focus on writing and implementing security policies. This is primarily for security managers and system administrators.
- 8
- Information Security Policies
- Make and manage security policies. Run awareness programs with audits and e-learning to build a human firewall.
- 9
- Institute for Security and Open Methodologies (ISECOM)
- Non-profit, international research initiative dedicated to defining standards in security testing and business integrity testing.
- 10
- Make Your Web Site P3P Compliant
- Describes how to create and publish your company's platform for privacy performance policy,. A W3C initiative, in six steps.
- 11
- OSSTMM: Open Source Security Testing Methodology Manual
- A widely used, peer-reviewed, methodology for performing security tests.
- 12
- P3P Guiding Principles
- Defines the principles behind the W3C Platform for Privacy Preferences initiative.
- 13
- Return on Information Security Investment
- Assess your company's Return on Information Security Investment
- 14
- The Basics of an IT Security Policy
- This paper is intended to address the importance of having a written and enforceable Information Technology (IT) security policy, and to provide an overview of the necessary components of an effective policy.
- 15
- What Makes A Good Security Policy?
- Offers a paper presenting the core elements of security, and arguing that in order to properly address security, the most fundamental item necessary is a security policy.
- 16
- Advent Information Management Ltd
- Knowledge based consultancy offering information management advice, training and consultancy.
- 17
- Atsec
- Atsec offers standards-based IT security testing, evaluation and consulting. The range of standards include Common Criteria, FIPS 140-2, GSA FIPS 201, PCI DSS, PCI PA-DSS, ISO/IEC 27001 and others.
- 18
- Citicus ONE
- Offers tools for information risk management to ensure that compliance with security policy can be monitored and enhanced.