{"id":184,"date":"2020-12-14T14:39:20","date_gmt":"2020-12-14T20:39:20","guid":{"rendered":"https:\/\/www.axigent.net\/blog\/?p=184"},"modified":"2020-12-14T14:39:21","modified_gmt":"2020-12-14T20:39:21","slug":"security-compliance-policies-part-1","status":"publish","type":"post","link":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/","title":{"rendered":"Security Compliance Policies- Part 1"},"content":{"rendered":"\n<p>Information security is a key component of keeping your company\u2019s data secure. Without proper information security, you could be vulnerable to cyberattacks, data breaches, or leaks of sensitive information. Security policies include processes for accessing and handling information, whether on-site or remotely.<\/p>\n\n\n\n<p><strong>Security Incident Response Policy<\/strong><br>Incidents are inevitable, and having an understanding of the responsibilities, communication strategy, containment, and reporting processes is critical to minimizing any potential loss or damage. This is a foundational policy that is required as the first step in an overall organizational incident response strategy.<\/p>\n\n\n\n<p><strong>Written Information Security Plan (WISP)<\/strong><br>Texas-based companies are required to have a WISP policy in place. This document provides the foundation of your organization\u2019s security program. It provides the basis for your company\u2019s minimum security controls, its compliance requirements, and the security policies that support them.<\/p>\n\n\n\n<p><strong>Asset Management Policy<\/strong><br>Asset management is essential to understanding your company\u2019s technology footprint, which is critical in order to provide foundational security controls.<\/p>\n\n\n\n<p><strong>Acceptable Use Policy<\/strong><br>This policy defines the acceptable use of any system, network, or resource. All employees, contractors, and third parties should have a clear understanding of what an organization\u2019s resources can and cannot be used for prior to being granted access.<\/p>\n\n\n\n<p><strong>System and Device Baseline Security Policy<\/strong><br>Before they are put into use, systems and network devices should always have a minimum security configuration implemented. This policy is a requirement of many security frameworks and defines what is needed for device and operating system baseline hardening.<\/p>\n\n\n\n<p>Once you\u2019ve developed these policies, it is important to build regular reporting and auditing processes to confirm that the policies in place are working and fit business needs. As your organization grows, your security compliance efforts should grow along with the business. It can be overwhelming to figure out where to start developing your company\u2019s security posture or to audit your existing policies. Axigent can ease the burden by allowing you to rely on experts with extensive industry experience. We can help you stay current with changing technologies<br>and techniques, helping to ensure your company\u2019s data stays secure, whether you\u2019re just starting out, looking for an assessment, or adapting and evolving your current policies.<\/p>\n\n\n\n<p><br>We\u2019ll be covering more security compliance policies next week in part two of this series.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Information security is a key component of keeping your company\u2019s data secure. Without proper information security, you could be vulnerable to cyberattacks, data breaches, or leaks of sensitive information. Security policies include processes for accessing and handling information, whether on-site or remotely. Security Incident Response PolicyIncidents are inevitable, and having an understanding of the responsibilities, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":185,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[6,5,7,9,8,11,10],"class_list":["post-184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-amarillo-computer-company","tag-computer-company","tag-computer-company-near-me","tag-information-technology","tag-managed-it","tag-managed-it-company","tag-managed-it-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Compliance Policies- Part 1 - Blog<\/title>\n<meta name=\"description\" content=\"Axigent can help you stay current with changing technologies and techniques, helping to ensure your company\u2019s data stays secure, whether you\u2019re just starting out, looking for an assessment, or adapting and evolving your current policies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Compliance Policies- Part 1 - Blog\" \/>\n<meta property=\"og:description\" content=\"Axigent can help you stay current with changing technologies and techniques, helping to ensure your company\u2019s data stays secure, whether you\u2019re just starting out, looking for an assessment, or adapting and evolving your current policies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Axigent\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-14T20:39:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-14T20:39:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/12\/Security-Compliance-Policies-Part-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"562\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tenai Hensley\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Axigent\" \/>\n<meta name=\"twitter:site\" content=\"@Axigent\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tenai Hensley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/\"},\"author\":{\"name\":\"Tenai Hensley\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/person\\\/1a99c801de40e2363ab56c2827a88c85\"},\"headline\":\"Security Compliance Policies- Part 1\",\"datePublished\":\"2020-12-14T20:39:20+00:00\",\"dateModified\":\"2020-12-14T20:39:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/\"},\"wordCount\":388,\"publisher\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Security-Compliance-Policies-Part-1.jpg\",\"keywords\":[\"Amarillo Computer Company\",\"Computer Company\",\"Computer Company Near Me\",\"Information Technology\",\"Managed IT\",\"Managed IT Company\",\"Managed IT Services\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/\",\"name\":\"Security Compliance Policies- Part 1 - Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Security-Compliance-Policies-Part-1.jpg\",\"datePublished\":\"2020-12-14T20:39:20+00:00\",\"dateModified\":\"2020-12-14T20:39:21+00:00\",\"description\":\"Axigent can help you stay current with changing technologies and techniques, helping to ensure your company\u2019s data stays secure, whether you\u2019re just starting out, looking for an assessment, or adapting and evolving your current policies.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Security-Compliance-Policies-Part-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/Security-Compliance-Policies-Part-1.jpg\",\"width\":1000,\"height\":562},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/security-compliance-policies-part-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Compliance Policies- Part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\",\"name\":\"Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#organization\",\"name\":\"Blog\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/atglogo.png\",\"contentUrl\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/02\\\/atglogo.png\",\"width\":269,\"height\":78,\"caption\":\"Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Axigent\",\"https:\\\/\\\/x.com\\\/Axigent\",\"https:\\\/\\\/instagram.com\\\/Axigent\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/#\\\/schema\\\/person\\\/1a99c801de40e2363ab56c2827a88c85\",\"name\":\"Tenai Hensley\",\"url\":\"https:\\\/\\\/www.axigent.net\\\/blog\\\/author\\\/tenai\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Compliance Policies- Part 1 - Blog","description":"Axigent can help you stay current with changing technologies and techniques, helping to ensure your company\u2019s data stays secure, whether you\u2019re just starting out, looking for an assessment, or adapting and evolving your current policies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Security Compliance Policies- Part 1 - Blog","og_description":"Axigent can help you stay current with changing technologies and techniques, helping to ensure your company\u2019s data stays secure, whether you\u2019re just starting out, looking for an assessment, or adapting and evolving your current policies.","og_url":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/","og_site_name":"Blog","article_publisher":"https:\/\/www.facebook.com\/Axigent","article_published_time":"2020-12-14T20:39:20+00:00","article_modified_time":"2020-12-14T20:39:21+00:00","og_image":[{"width":1000,"height":562,"url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/12\/Security-Compliance-Policies-Part-1.jpg","type":"image\/jpeg"}],"author":"Tenai Hensley","twitter_card":"summary_large_image","twitter_creator":"@Axigent","twitter_site":"@Axigent","twitter_misc":{"Written by":"Tenai Hensley","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/#article","isPartOf":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/"},"author":{"name":"Tenai Hensley","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/person\/1a99c801de40e2363ab56c2827a88c85"},"headline":"Security Compliance Policies- Part 1","datePublished":"2020-12-14T20:39:20+00:00","dateModified":"2020-12-14T20:39:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/"},"wordCount":388,"publisher":{"@id":"https:\/\/www.axigent.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/12\/Security-Compliance-Policies-Part-1.jpg","keywords":["Amarillo Computer Company","Computer Company","Computer Company Near Me","Information Technology","Managed IT","Managed IT Company","Managed IT Services"],"articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/","url":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/","name":"Security Compliance Policies- Part 1 - Blog","isPartOf":{"@id":"https:\/\/www.axigent.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/#primaryimage"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/12\/Security-Compliance-Policies-Part-1.jpg","datePublished":"2020-12-14T20:39:20+00:00","dateModified":"2020-12-14T20:39:21+00:00","description":"Axigent can help you stay current with changing technologies and techniques, helping to ensure your company\u2019s data stays secure, whether you\u2019re just starting out, looking for an assessment, or adapting and evolving your current policies.","breadcrumb":{"@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/#primaryimage","url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/12\/Security-Compliance-Policies-Part-1.jpg","contentUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/12\/Security-Compliance-Policies-Part-1.jpg","width":1000,"height":562},{"@type":"BreadcrumbList","@id":"https:\/\/www.axigent.net\/blog\/security-compliance-policies-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.axigent.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Compliance Policies- Part 1"}]},{"@type":"WebSite","@id":"https:\/\/www.axigent.net\/blog\/#website","url":"https:\/\/www.axigent.net\/blog\/","name":"Blog","description":"","publisher":{"@id":"https:\/\/www.axigent.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.axigent.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.axigent.net\/blog\/#organization","name":"Blog","url":"https:\/\/www.axigent.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/02\/atglogo.png","contentUrl":"https:\/\/www.axigent.net\/blog\/wp-content\/uploads\/2020\/02\/atglogo.png","width":269,"height":78,"caption":"Blog"},"image":{"@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Axigent","https:\/\/x.com\/Axigent","https:\/\/instagram.com\/Axigent"]},{"@type":"Person","@id":"https:\/\/www.axigent.net\/blog\/#\/schema\/person\/1a99c801de40e2363ab56c2827a88c85","name":"Tenai Hensley","url":"https:\/\/www.axigent.net\/blog\/author\/tenai\/"}]}},"_links":{"self":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/comments?post=184"}],"version-history":[{"count":1,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/184\/revisions"}],"predecessor-version":[{"id":186,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/posts\/184\/revisions\/186"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/media\/185"}],"wp:attachment":[{"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/media?parent=184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/categories?post=184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.axigent.net\/blog\/wp-json\/wp\/v2\/tags?post=184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}