Creating a Security Policy
Briefly document:
- Access to the host
- Services offered by the host
- Access to content
- How content is changed
- How host is monitored
- Physical security
- Disaster plan
Lincoln D. Stein, lstein@cshl.org
Cold Spring Harbor Laboratory
Last modified: Sun Jul 16 18:30:59 PDT 2000