From d6896b06a0fcc4827b906352c5f664994bce2352 Mon Sep 17 00:00:00 2001 From: Incelticide <83730945+Trogloduck@users.noreply.github.com> Date: Wed, 4 Dec 2024 10:49:58 +0100 Subject: [PATCH] Update 1.4 Security practices and documentation.md Deleting double "is" in ## What is a security policy? --- 1.4 Security practices and documentation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/1.4 Security practices and documentation.md b/1.4 Security practices and documentation.md index b922152..b44989d 100644 --- a/1.4 Security practices and documentation.md +++ b/1.4 Security practices and documentation.md @@ -29,7 +29,7 @@ These terms are often used in the context of cybersecurity to define different l ## What is a security policy? -A security policy is a high-level document that outlines an organization's overarching security goals, principles, and guidelines. It provides a framework for making security-related decisions and sets the tone for the organization's security posture. Security policies typically cover topics such as acceptable use of resources, data protection, access control, incident response, and more. A policy is is solution and technology independent. An example of a security policy that many would be familiar with would be an organization’s acceptable use policy. +A security policy is a high-level document that outlines an organization's overarching security goals, principles, and guidelines. It provides a framework for making security-related decisions and sets the tone for the organization's security posture. Security policies typically cover topics such as acceptable use of resources, data protection, access control, incident response, and more. A policy is solution and technology independent. An example of a security policy that many would be familiar with would be an organization’s acceptable use policy. ## What is a security standard?