Establish a Bullet-Proof Security Policy - Page 2
By Elizabeth Ferrarini
Page 2 of 4 | Back to Page 1
Identifying Your Organization's Assets
Your very first step in creating a site security policy consists of compiling a comprehensive list of all the things that need to be protected.
Items to consider include:
- Hardware:
- cpus
- boards
- keyboards
- terminals
- workstations
- personal computers
- printers
- disk drives
- communication lines
- terminal servers
- routers.
- Software:
- source programs
- object programs
- utilities
- diagnostic programs
- operating systems
- communication programs
- Data:
- during execution
- stored on-line
- archived off-line
- backups
- audit logs
- databases
- in transit over communication media
- People:
- users
- people needed to run systems
- Documentation:
- programs & applications
- hardware
- systems
- local administrative procedures
- Supplies:
- paper
- forms
- ribbons
- magnetic media
jfreund@internet.com