A cybersecurity policy is established, approved, and communicated
Security controls only hold up when there is a written policy that defines expectations and assigns accountability. Without a formal policy, security becomes ad hoc: everyone makes their own decisions, and there is no basis for holding anyone accountable when something goes wrong. A cybersecurity policy does not need to be long, but it does need to be approved by leadership, communicated to all staff, and reviewed at least annually.
Implementation steps
- 1
Draft a cybersecurity policy covering key risk areas
Write a policy that addresses acceptable use, access control, data handling, incident reporting, remote work, and password requirements at a minimum. Keep it readable, typically five to fifteen pages. Base it on a recognized framework such as NIST CSF or the CISA CPG. Assign an owner to each section who is responsible for keeping it current.
confluence notion google-docs drata vanta - 2
Get formal approval from leadership
Have the policy reviewed by legal and signed off by the CISO, CTO, or CEO depending on org structure. A policy without executive sign-off carries less weight internally and will not satisfy auditors. Version the document and record the approval date. Store the signed version in a location that is accessible for audit purposes.
docusign hellosign google-drive sharepoint confluence - 3
Communicate the policy to all employees and track acknowledgment
Distribute the policy to all employees and require them to acknowledge they have read it. Use your HR system or compliance platform to track who has acknowledged and follow up with anyone who has not. Repeat acknowledgment annually or whenever the policy is significantly updated.
drata vanta secureframe workday bamboohr
Evidence required
Approved policy and acknowledgment records
Evidence that a policy exists, has been approved, and has been communicated to staff.
- - Signed cybersecurity policy with approval date and executive signature
- - Employee acknowledgment report showing completion rate
- - Policy version history showing annual review
Related controls
All employees receive security awareness training at least annually
Governance and Training
Employees are trained to recognize and report phishing attempts
Governance and Training
Third-party vendors are required to meet minimum security standards
Governance and Training
An incident response plan is documented and maintained
Response and Recovery