Security Policy Review & Compliance Alignment
Categories
Skills
Project scope
What is the main goal for this project?
Organizations often lack formal documentation or clarity in their security policies. Learners will analyze current practices, benchmark them against standards, and provide updated documentation tailored to the organization’s needs.
- Review an organization’s existing security policies (or create new ones) and assess them against industry-standard compliance frameworks. Recommend revisions or additions to ensure regulatory readiness.
Organizations often lack formal documentation or clarity in their security policies. Learners will analyze current practices, benchmark them against standards, and provide updated documentation tailored to the organization’s needs.
- Review an organization’s existing security policies (or create new ones) and assess them against industry-standard compliance frameworks. Recommend revisions or additions to ensure regulatory readiness.
What tasks will learners need to complete to achieve the project goal?
Tasks and Activities:
- Review existing security documentation (e.g., password policies, acceptable use policies)
- Compare content against compliance checklists (HIPAA, PCI-DSS, NIST, ISO)
- Identify policy gaps or areas for improvement
- Draft updated or new policies as needed
- Create a simple compliance checklist or audit tool
- Summarize findings and recommendations in a short presentation
Deliverables:
- Updated Security Policy Documents
- Compliance Alignment Matrix (e.g., NIST or HIPAA vs. current policies)
- Policy Gap Analysis
- Executive Summary Presentation
Tasks and Activities:
- Review existing security documentation (e.g., password policies, acceptable use policies)
- Compare content against compliance checklists (HIPAA, PCI-DSS, NIST, ISO)
- Identify policy gaps or areas for improvement
- Draft updated or new policies as needed
- Create a simple compliance checklist or audit tool
- Summarize findings and recommendations in a short presentation
Deliverables:
- Updated Security Policy Documents
- Compliance Alignment Matrix (e.g., NIST or HIPAA vs. current policies)
- Policy Gap Analysis
- Executive Summary Presentation