Developing Security Policies

Every system, from a machine used by only one person to an enterprise-level server utilized by thousands of users, should have a security policy. A security policy is a set of guidelines used to gauge whether a particular activity or application should or should not be done or utilized on a system, based on the particular objectives for that system.

Security policies between different systems can vary greatly, but the most important thing is that one actually does exist for your system - whether or not is written down in company policy manual or simply remembered.

Any security policy should be constructed using these features as guides:

If you find that your security policy is so restrictive that it prevents the system from being used in the way intended, then consider sufficiently changing the policy to loosen access to the system. In the same way, if you find that your system's security is continually being compromised, you should change aspects of your security policy to restrict access. Most importantly, remember that a security policy is not a static document or idea. It must be amended as the needs of your system's objectives and users change. Continuously reconsider your current security policy in the reflection of real world requirements.