CHAPTER 4: INFORMATION SECURITY POLICY by Hafisha Amila
Enterprise Information Security Policy (EISP)
Essential foundation of an
effective information security program
guides the development, 
implementation, and management requirements of the 
InfoSec program
should not contradict the organizational 
mission statement
Issue-Specific Security Policy (ISSP)
fair and 
responsible use policies
organization’s ISSPs should
Address specific technology-based systems
Require frequent updates
Contain a statement on the organization’s position on an issue
 provides detailed, targeted guidance to instruct all 
members of the organization in the use of a resource
System-Specific Security Policies (SysSPs)
Applies to any technology that affects the 
confidentiality, integrity, or availability of information
methods of implementing
•Access control lists
•Configuration rules
Access Control Lists
•Read
•Write
•Execute
•Delete
Configuration Rules
Combination SysSPs
Policy
essential foundation of an effective 
information security program
Bull’s-eye model layers
Policies
Network
System
Applications
Guidelines for Effective Policy
The policy is designed and written
A senior manager or executive at the appropriate level and 
the organization’s legal counsel review and formally 
approves the document
Management processes are established to perpetuate the 
policy within the organization
