Jump to ratings and reviews
Rate this book

Information Security Policies, Procedures, and Standards: A Practitioner's Reference

Rate this book
Information Security Policies, Procedures, and A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards.The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely.Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

254 pages, Kindle Edition

Published June 8, 2016

5 people are currently reading
20 people want to read

About the author

Douglas J. Landoll

12 books1 follower

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
4 (50%)
4 stars
2 (25%)
3 stars
2 (25%)
2 stars
0 (0%)
1 star
0 (0%)
Displaying 1 of 1 review
80 reviews1 follower
June 7, 2021
The first half of this book is a well-written argument for the use of policies and top-down approach to security planning and management, rooted in security policies, standards and meeting compliance requirements.

Even though I don't fully agree with this approach (and there is plenty of evidence to suggest that), this is the best argument from policy/audit/compliance side.
Displaying 1 of 1 review

Can't find what you're looking for?

Get help and learn more about the design.