security policy

security policy

security plans should be updated and prepared on an ongoing basis with up to date information concern
Create a 5 pages page paper that discusses information system security plans. For this reason, the security plans should be updated and prepared on an ongoing basis with up to date information concerning every agency’s information securities.

The USDA agencies as well as the staff offices shall develop and maintain a program security plan that is overall for all General support systems and major applications. The plans shall be made using tablets and instructions within the security plan guidance. Instructions and templates for the type of plan are provided in a table of security plan guidance. The table includes a section that assists agencies in the definition of General support system and their applications. There are also some modified templates for electronic submission of plans. After the completion of the annual security plan, all changes will be reflected in the agency software database according to the requirements of the policies. The agency administration is expected to submit a cover letter that contains plans attesting to the accuracy and completeness of the security plans. The letter should include information regarding the previous year’s deficiencies on whether they have been corrected (Disaster Recovery, 2010).

The organization security policy entails the departments in the responsibility of certain issues within the organization. The associate CIO for cybersecurity provides guidance, strategies and tools for assisting the USDA agencies in meeting the requirements of the plan that are to prepare an annual security plan for the security program, applications, and the general support system. The associate performs dynamic reviews of the annual security plan submissions. This is meant to ensure that all information regarding the security practices is completed and detailed. They provide feedback to every agency concerning the plans. The security plan, through the associated CIO, should review all requests for policy exception and respond to the requesting officer in a timely manner. The associate should also perform an oversight review of agencies to ensure that information within the plan complies with the policy (Whitman and Mattord, 2011).
The post security policy

CLICK HERE TO ORDER NOW!!

 

Leave a Reply

Your email address will not be published. Required fields are marked *