1 / 52100%
Name
Strayer University
Security Policy Implementation and Compliance
CIS 359 – Disaster Recovery Management
Assignment 17: Security Policy Implementation and Compliance
Due Week 7 and worth 75 points
You are the Information Security Manager for a large organization, and you have been tasked with
overseeing the implementation of new security policies to enhance the organization's cybersecurity
posture. Your goal is to ensure that the policies are effectively implemented and that employees and
stakeholders comply with them.
Write a paper in which you:
1. Policy Implementation Plan: Develop a comprehensive policy implementation plan that outlines
the steps, tasks, and responsibilities for implementing the new security policies. Include
timelines and milestones for each phase of implementation.
2. Policy Communication: Describe how the new security policies will be communicated to
employees and stakeholders within the organization. Explain the importance of clear and
effective communication in policy adoption.
3. Training and Awareness: Explain the training and awareness programs that will support the
implementation of the security policies. Discuss how these programs will educate employees
about the policies and their importance.
4. Compliance Monitoring: Outline the procedures and tools that will be used to monitor and
assess compliance with the security policies. Describe how violations and non-compliance will
be detected and addressed.
5. References: Use at least three (3) quality resources to support your policy implementation and
compliance plan. Ensure that your sources are reputable and relevant to security policy
implementation best practices.
Your assignment must follow these formatting requirements:
Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides;
citations and references must follow APA or school-specific format. Check with your professor for any
additional instructions.
Include a cover page containing the title of the assignment, your name, the professor's name, the course
title, and the date. The cover page and the reference page are not included in the required assignment
page length.
Use appropriate headings and subheadings to organize the content.
Include any necessary diagrams or visual aids to illustrate key elements of the policy implementation
plan. Ensure that these diagrams are integrated into the Word document before submission.
The specific course learning outcomes associated with this assignment are:
Develop a comprehensive policy implementation plan to enhance an organization's cybersecurity
posture.
Analyze the importance of clear and effective policy communication and training programs.
Assess the procedures and tools for monitoring and enforcing security policy compliance.
Evaluate the integration of security policies with incident response procedures.
Use technology and information resources to research issues in security policy implementation and
compliance.
Write clearly and concisely about security policy implementation and compliance topics using proper
writing mechanics and technical style conventions.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and
language and writing skills, using the following rubric.
Points: 75 Assignment 17: Security Policy Implementation and Compliance
Criteria Unacceptable
Below 60% F
Meets
Minimum
Expectation
s
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Detail the DR team
roles, responsibilities,
and sub teams that
would be implemented
and construct an
organizational chart for
the team through the
use of graphical tools
in Visio, or an open
source alternative such
as Dia.
Weight: 35%
Did not submit or
incompletely
detailed the DR
team roles,
responsibilities,
and sub teams
that would be
implemented and
did not submit or
incompletely
constructed an
organizational
chart for the team
through the use
of graphical tools
in Visio, or an
open source
alternative such
as Dia.
Insufficiently
detailed the DR
team roles,
responsibilities,
and sub teams
that would be
implemented
and
insufficiently
constructed an
organizational
chart for the
team through
the use of
graphical tools
in Visio, or an
open source
alternative
such as Dia.
Partially
detailed the DR
team roles,
responsibilities,
and sub teams
that would be
implemented
and partially
constructed an
Students also viewed