Integrated Proactive Security Policy
Threats can manifest themselves within an organization through three gates. This is shown in the so-called three-port model.
The Integrated Proactive Security Policy is developed based on the three-port model and the Threat Analysis.
The Security Policy consists of at least the following parts:
- Objective of Security
- The environment to be protected
- The operational environment
- The zoning methodology
- Tasks, powers, responsibilities of the departments involved
- Quality assurance
Underlying security plans and Standard Operating Procedures (SOPs) are developed based on the frameworks in the Integrated Proactive Security Policy.
OrcaSecure helps organizations with the development of an integrated proactive security policy
Please feel free to contact us for additional information or questions.