Security Policies, Plans and Procedures

By Penny, March 1, 2010 10:50 pm

Does your organization have the policies, plans and procedures in place to keep your information and the associated systems secure?

  • Rules governing how people access your systems?
  • Employees that know how to safely handle data they need to
  • perform their job functions?
  • Tracking capabilities to trace activities occurring on your computer
  • systems?
  • The ability to respond to a computer security incident?

Security plans, policies and procedures define the rules companies and employees use when accessing computer systems. We have helped DoD, Federal Agencies and National Associations determine the answers to these questions by creating and implementing comprehensive plans to ensure that their information security needs are met.
PJKlein Consulting uses a proven methodology to develop the appropriate security documentation.  We understand the National and DoD guidelines and best practices and can tailor to your specific requirements.
Additionally, we can assist with the testing of appropriate security plans.

Policy, Plan and Procedure Areas
  • Access Control
  • Audit and Accountability
  • Awareness and Training
  • Configuration Management
  • Incident Response
  • Identification and Authentication
  • Procedures to implement security controls
  • Personnel
  • Rules of Behavior
  • System Security Plans/System Security Authorization Agreements
  • Plans of Actions and Milestones

Comments are closed

Panorama Theme by Themocracy