Solved

Security Policy for a small business

Posted on 2016-09-01
2
57 Views
Last Modified: 2016-09-01
I am looking for a security policy for a small business to use for their employees.
Are there any good templates to start from?
0
Comment
Question by:ie0
2 Comments
 
LVL 29

Accepted Solution

by:
Rich Weissler earned 500 total points
ID: 41779823
"Security Policy" covers a lot of ground.  I can suggest looking over the SANS Security Policy template library though.
0
 
LVL 62

Expert Comment

by:btan
ID: 41780024
I suggest your policy follows the ISO 27001 headings such as these but it may be quite non-trivial to cover all quickly - esp if you intend to make it simpler at the first place (for small set)
http://www.27001-online.com/secpols.htm

Otherwise, go specific for a "scoped" policies in area of main concern. Here is one comprehensive coverage of samples and toolkit for the various IT & cyber security scope
https://www.dmoz.org/Computers/Security/Policy/Sample_Policies/

Additional supplementary alternatives include
-Clean desk policy
-Computer and e-mail acceptable use policy
-Internet acceptable use policy
-Password protection policy
-Social media and blogging policies
-Personnel access/changes policy
http://www.csoonline.com/article/3019126/security/security-policy-samples-templates-and-tools.html

If you wanted a more clean cut to have small win or glimpse to poll the stakeholders, you may check out the attached (though can be quite old). It give some sensing on coverage and simple straight to the point mandates
NHS-CFH_Corporate-InfoSec-Policy-Tem.doc
0

Featured Post

Does Powershell have you tied up in knots?

Managing Active Directory does not always have to be complicated.  If you are spending more time trying instead of doing, then it's time to look at something else. For nearly 20 years, AD admins around the world have used one tool for day-to-day AD management: Hyena. Discover why

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through setting the global and backup job media overwrite and protection periods in Backup Exec 2012. Log onto the Backup Exec Central Administration Server. Examine the services. If all or most of them are stop…

943 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

4 Experts available now in Live!

Get 1:1 Help Now