Inside Out Security Blog   /  

How to Create a Good Security Policy

How to Create a Good Security Policy


    CIOs have taken note of the nightmarish scenarios data breaches can bring – remember Sony and Target? To combat this ticking time bomb, they’ve beefed up their security budgets. The Computer Emergency Response Team (CERT) at Carnegie-Mellon University also recommends creating a security policy which you can to refer to if your systems are compromised.

    Why You Need a Security Policy

    A security policy contains pre-approved organizational procedures that tell you exactly what you need to do in order to prevent security problems and next steps if you are ever faced with a data breach. Security problems can include:

    • Confidentiality – people obtaining or disclosing information inappropriately
    • Data Integrity – information being altered or erroneously validated, whether deliberate or accidental
    • Availability – information not being available when it is required or being available to more users than is appropriate

    At the very least, having a security policy will ensure everyone in the IT department is on the same page on security processes and procedures.

    What a Good Security Policy Looks Like

    Don't Get Left Behind: Get Our Free Zero Trust Whitepaper Now

    You might have an idea of what your organization’s security policy should look like. But if you want to verify your work or additional pointers, go to the SANS Information Security Policy Templates resource page. They’ve created twenty-seven security policies you can refer to and use for free.

    I’ve looked through them and also scoured the internet for what a good security policy looks like – here’s what all good policies have:

    • Purpose: Clear goals and expectations of the policy.
    • Policy Compliance: Federal and State regulations might drive some requirements of a security policy, so it’s critical to list them.
    • Last Tested Date: Policies need to be a living document and frequently tested and challenged.
    • Policy Last Updated Date: Security policy documents need to be updated to adapt to changes in the organization, outside threats, and technology.
    • Contact: Information security policies are supposed to be read, understood and followed by all individuals within an organization and so if there are questions, there needs to be an owner.

    Questions to Ask When Creating Your Security Policy

    When you’re creating a security policy, it helps to ask questions because in answering them, you’ll learn what’s important to your organization and the resources you’ll need to create and maintain your security policy. Here’s are a few questions to get you started:

    • Who will you need buy-in from?
    • Who will be the owner of this security policy?
    • Who is my audience for this policy?
    • What regulations apply to your industry (for instance GLBA, HIPAA, Sarbanes-Oxley etc)?
    • Who needs access to your organization’s data?
    • Who owns the data you manage? Your organization? Your customers?
    • How many requests are received per week to provide access to data?
    • How are these requests fulfilled?
    • How and when is access reviewed?
    • How can you ensure that no container will be open to a global access group (Everyone, Domain Users, Authenticated Users, etc) without explicit authorizations from the data owner(s) and appropriate management?
    • How will all access provisioning activity be recorded and available to audit?
    • If data has not been accessed for 18 months, how will it be identified and restricted so that only the data owner(s) have access until an access request by another individual is made?
    • How will you align your security policy to the business objectives of the organization?

    Final Words of Advice

    Security policies work best when they are succinct and to the point. Policies should also support and be driven by business needs. With regular maintenance, your organization’s security policy will help protect the organization’s assets.


    What you should do now

    Below are three ways we can help you begin your journey to reducing data risk at your company:

    1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
    2. Download our free report and learn the risks associated with SaaS data exposure.
    3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Twitter, Reddit, or Facebook.

    Get a free Risk Assessment

    You can't protect what you don't know is vulnerable.

    Give us 90-minutes of your time, and we'll create a Free Risk Assessment that will open your eyes to your unknown weak spots—fast, and without adding work to your plate.

    Start Your Risk Assessment