I wrote a generic outsourcing policy for a presentation I’m giving on outsourcing security services. Here’s the general outline: Purpose Scope/Applicability Policy Statement Board and Management Responsibility Risk Mitigation Strategies: Outsourcing Team Business Case Due Diligence Business Continuity Management (BCM) Contractual Agreements Management and Control of the Outsourcing Relationship Offshoring Final Approval Here’s an excerpt: […]
Read the full article →
I found a HUGE document of information security policies on the South African Government Information website: http://www.info.gov.za/ The policies document is almost 500 pages and includes the following chapters: Securing Hardware, Peripherals and Other Equipment Controlling Access to Information and Systems Processing Information and Documents Purchasing and Maintaining Commercial Software Developing and Maintaining In-House Software […]
Read the full article →