Without a security policy, the availability of your network can be
compromised. The policy begins with assessing the risk to the network and
building a team to respond. Continuation of the policy requires implementing a
security change management practice and monitoring the network for security
violations. Lastly, the review process modifies the existing policy and adapts
to lessons learned.
This document is divided into three areas: preparation,
prevention, and response.
For more log on to: Network
Security Policy: Best Practices
Source: Cisco