From the course: Writing Security Policies and Standards
Unlock the full course today
Join today to access over 24,700 courses taught by industry experts.
Responding to policy violations
From the course: Writing Security Policies and Standards
Responding to policy violations
With security policies in place and active monitoring, you'll eventually face situations where these policies aren't followed. So what should you do when that happens? In this video, I'll show you how to respond to policy violations effectively. Policy violations can vary widely. Minor infractions might include something like leaving workstations unlocked. More severe violations could involve unauthorized access to sensitive company data. Each type of violation needs a specific response to manage risks and emphasize the importance of compliance. To handle policy violations, follow these five steps. Immediate response, investigation process, corrective actions, disciplinary actions, and prevention strategies. The first step is an immediate response. For minor violations, a quick reminder to follow the policy might be enough. For severe issues, you may need to activate your organization's incident response plan and take swift action to contain the problem. For serious violations, an…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.