Principles behind the W3C Platform for Privacy Preferences initiative.
The use of Group Policy to simplify the network security tasks that you face as a network administrator. With Group Policy, you can ensure that the machines on your network remain in a secure configuration after you deploy them.
If your company doesn't have written security policies, it's time it did, and Mark Edwards has some resources to help.
This paper outlines some issues that the writer of a Site Computer Security Policy may need to consider when formulating such a document.
Knowing how and what to protect and what controls to put in place is difficult. It takes security management, including planning, policy development and the design of procedures.
This document is intended to help an organization create a coherent Internet-specific information security policy.
IT World article - essentially a review of Pentasafe's VigilEnt security policy management product.
A strong web Security Policy is key to keeping your company safe in the net-centric world. (PDF format)
Provides general information about PKI policy, the role that policy plays in a PKI and how that policy applies to both traditional and PKI-enabled business environments.
It has produced the standard to provide guidelines on all aspects of information security including IT, data, and computer controls.
|