- Introduction
- Overview
- Information Security Methodology
- Business Requirements Analysis—Step 1 of 3
- Developing Your Information Security Program Summary
- Key Points for This Chapter
Developing Your Information Security Program Summary
This chapter introduced the information security life cycle and reviewed a methodology that can be used to develop an information security program for your organization in approximately 90 days. The methodology begins with establishing the current state of your program, commonly called your "baseline," and provides the steps required to develop a plan to reach your desired future state. We followed the first step of the methodology and reviewed the steps necessary to complete the business requirements analysis portion of your information security program.