This document discusses information security policies. It covers the different types of policies including security program policies, issue-specific policies, and system-specific policies. It emphasizes that policies are an essential foundation for an effective information security program. The document provides guidelines for developing, implementing, and maintaining policies, and outlines the policy life cycle from investigation to maintenance. Evaluation criteria and standards for security products are also mentioned.