career
consulting
March 02, 2015· 2 min read

How We End Up With Too Many Security Policies

Explore the pitfalls of policy bloat in security management, as the article delves into redundant policies, misplaced guidelines, and tech-enforced rules, advocating for streamlined security measures.

Earlier this week, I wrote about how we have too many security policies. I wanted to take a quick look at some default security policies to see what we can strip out. I went to the SANS Information Security Policy Templates site to look for some good templates to edit. For this exercise, I decided to edit a section of the password protection policy. First, my compliments to the original writer. My edits are not an indication of bad policy writing but of years of policy bloat. We just have too many policies to manage.

Here is my take: [

Are These Security Policies Necessary?

As part of Jay's post about having too many security policies (see: https://www.jayschulman.com/you-have-too-many…

www.scribd.com

](https://www.scribd.com/doc/257062792/Are-These-Security-Policies-Necessary)

Lessons Learned

  • **We have too many redundant policies. **As I read them, I’m sure most are for clarification. You shouldn’t give out your password. Here are 9 specific ways we want to make sure you don’t give out your password.
  • **We have policies in the wrong places. **If we want developers to incorporate policies into their applications, including the statements in the password policy document isn’t the right spot. Add them to (what I hope is) a standard functional and non-functional requirements document that every project starts with to build out a new application.
  • **We tell our users rules that are enforced by technology. **If we want a user to pick an 8 character password, set the system to require an 8 character password. (If your system doesn’t enforce a minimum number of characters, you can’t expect your user to comply.)

We need to start thinking less policies, not more.

Get More Insights
Join thousands of professionals getting strategic insights on blockchain and AI.

More Career Posts

October 15, 2024

Zcash Enterprise Privacy: Business Applications Guide | Advanced Cryptocurrency Privacy Solutions

Comprehensive guide to Zcash enterprise privacy applications - leveraging advanced cryptocurrency privacy technology for...

October 01, 2014

3 Reasons to Always Take the Interview

Discover why you should always seize the chance to interview, regardless of hesitations. Gain insight, practice your ski...

July 17, 2015

Security Longreads for July 17, 2015

Explore the latest in security with insights on stolen fingerprints, the rising role of Chief Security Architects, and t...