|
IT Governance, Information Security, Risk Management and Compliance:

IS Security Policy
IS security policy is almost a must for any organization to safeguard its information resources. It not only provides ready guidance on day-to-day IS security issues but also provides a benchmark for periodic evaluation of IS security management in an organization.
Trusted Info IS security policy service aims at providing a set of security policies and procedures specific to the needs of an organization. Some of the major components of this service include:
- Policy on classification, ownership, storage, retention and disposal of the information and data
- Policy on grant of physical and logical access rights on information and information resources
- Policy on physical security of IT assets
- Policy on contingency and disaster recovery
- Procedure for handling of security incidents
- Procedure for propagation, administration, revision and updating of the security policy
Unique features of Trusted Info IS security policy service are that policy prescriptions are based on results of risk assessment specifically carried out for the organization, are practical, cost effective and compliant with applicable laws and regulations.
As an optional service, Trusted Info offers to propagate the policy among all levels of employees through discussions, seminars, awareness workshop etc.,

|
 |
IT Governance, Information Security, Risk Management and Compliance |
 |
|
|
|
 |
Cyber Security, Cyber Risk and Cyber / Digital Forensics |
 |
|
|
|
 |
IS / ISS Audit and Controls |
 |
|
|
|
Other Products & Services |
|
|
|