Page 105 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 105

based on those policies as well as mandated by regulations and
               contracts. From these the guidelines are derived. Finally, procedures

               are based on the three other components. The inverted pyramid is
               used to convey the volume or size of each of these documents. There
               are typically significantly more procedures than any other element in a
               complete security policy. Comparatively, there are fewer guidelines
               than procedures, fewer still standards, and usually even fewer still of
               overarching or organization-wide security policies.












































               FIGURE 1.6 The comparative relationships of security policy
               components
   100   101   102   103   104   105   106   107   108   109   110