Creating a Security Policy

Briefly document:

  1. Access to the host
  2. Services offered by the host
  3. Access to content
  4. How content is changed
  5. How host is monitored
  6. Physical security
  7. Disaster plan

<< Previous Contents >> Next >>

Lincoln D. Stein, lstein@cshl.org
Cold Spring Harbor Laboratory
Last modified: Sun Jul 16 18:30:59 PDT 2000