gov-1 Medium priority Governance and Training / Governance and Training

A cybersecurity policy is established, approved, and communicated

Security controls only hold up when there is a written policy that defines expectations and assigns accountability. Without a formal policy, security becomes ad hoc: everyone makes their own decisions, and there is no basis for holding anyone accountable when something goes wrong. A cybersecurity policy does not need to be long, but it does need to be approved by leadership, communicated to all staff, and reviewed at least annually.

Implementation steps

  1. 1

    Draft a cybersecurity policy covering key risk areas

    Write a policy that addresses acceptable use, access control, data handling, incident reporting, remote work, and password requirements at a minimum. Keep it readable, typically five to fifteen pages. Base it on a recognized framework such as NIST CSF or the CISA CPG. Assign an owner to each section who is responsible for keeping it current.

    confluence notion google-docs drata vanta
  2. 2

    Get formal approval from leadership

    Have the policy reviewed by legal and signed off by the CISO, CTO, or CEO depending on org structure. A policy without executive sign-off carries less weight internally and will not satisfy auditors. Version the document and record the approval date. Store the signed version in a location that is accessible for audit purposes.

    docusign hellosign google-drive sharepoint confluence
  3. 3

    Communicate the policy to all employees and track acknowledgment

    Distribute the policy to all employees and require them to acknowledge they have read it. Use your HR system or compliance platform to track who has acknowledged and follow up with anyone who has not. Repeat acknowledgment annually or whenever the policy is significantly updated.

    drata vanta secureframe workday bamboohr

Evidence required

Approved policy and acknowledgment records

Evidence that a policy exists, has been approved, and has been communicated to staff.

  • - Signed cybersecurity policy with approval date and executive signature
  • - Employee acknowledgment report showing completion rate
  • - Policy version history showing annual review

Related controls