Security Policies – Ask McConnell’s “One Pager” Library

Security Policies Library Updated: 29 May 2025

Got to Know The Security Policies / Security Rules Before You Break Them

Ol’ Security Policies. I have worked with, read many, edited many, audited reams of them, written from scratch, maybe even violated a few, investigated countless, and trained on countless sets of security rules and policies, in all types of organizations around the world. The most common title of these sets of rules is “our Security Policy”, which I promote this term in my security governance training, but to help all types of organizations that have struggled with these types of rules/policies, I am going back to 3rd grade and just call them, “rules.” for now. If your organization decides to call them “Rules” or “Policies” or “Requirements” or _____, your call, just make sure its a term that fits the culture and is a enforcable. It is about accountability of “I”, the individual human reading them, that they understand and will follow…..

I can’t tell you how many times I have seen rules/policies that, some of which I helped write, were close to impossible to determine who (individually) was accountable.

They read like a company was writing to a company and not to an individual.

The ones below and in the future are my attempts to 1. Provide a free resource to people that have little or no rules/policies or resources to make them, and 2. provide a new direction for industry security rules / security policies that is written from the organization to the individuals to mature to maximum accountability. Determining who is accountable comes in the form of a RACI exercise that is independent of these rules/policies. Ultimately, it’s the CEO-level person if no one else is assigned, but guess what, the CEO-level person should be equally accountable and sign these same documents.

This collection is not meant to cover every need, but will support any size organization (NGO to SMB to Fortune ### to Government), it is meant to simplify these rules/policies into literally one page and hyper-focus on individual accountability. Yes, you will have some overlap as some organizations only need specific documents vs. all of them.

Before Governance, Mission and Culture Reign, BUT without Governance, Mission and Culture can be destroyed with just one incident

Good Luck, and if we can be of service to help you enhance these documents or help you with implementation, we would be honored to service you and your organization.

Note I am using ChatGPT for the DESCRIPTIONS of these security policies only, the actual security policies do not use any (Gen) AI, they are all based on my real world and practical experience. Unless something thinks my intelligence is artificial…. Hey no comment from my friends and family.

Jim McConnell
info@askmcconnell.com
Ask McConnell, LLC
https://askmcconnell.com

Security Policy on a desk in a room of people with notebooks on shelves on the wall

The Security Commitment

Updated: 20 March 2025

An example agreement between the organization and the individual about these rules and policies and the consequences

Security Policy on a desk in a room of people with notebooks on shelves on the wall - Personnel Security Policies

Personnel Security

Updated: 20 March 2025

The policy linked above explains how we protect the organization through strong personnel security practices. It covers hiring, access, and conduct requirements. These measures help reduce insider threats and protect sensitive information. The policy applies to all staff, contractors, and temporary workers.

Security Policy on a desk in a room of people with notebooks on shelves on the wall - Physical Security Policies

Physical Security

Updated: 13 April 2025

The policy linked above explains how we protect our buildings, equipment, and people through strict physical security measures. It includes detailed rules for access, safety, and emergency situations. These controls help prevent unauthorized entry and protect company assets. The policy applies to all employees, visitors, and contractors.

Security Policy on a desk in a room of people with notebooks on shelves on the wall - Information Security Policies

User IDs / Login IDs – Cyber / Information Security

Updated: 20 March 2025

The policy linked above explains how we manage User IDs and Logon IDs to protect access to our systems and data. It includes strict rules to ensure only authorized users can log in. This helps prevent misuse and keeps information safe. The policy applies to all employees and system users.

Security Policy on a desk in a room of people with notebooks on shelves on the wall - Supply Chain Security Policies

Supply Chain Security

Updated: 05 April 2025

The policy linked above explains how we protect our supply chain from security risks and disruptions. It includes strict rules and controls to keep products, services, and data safe. The policy applies to all vendors, partners, and internal teams. It helps ensure every part of the supply chain is secure and reliable.

Security Policy on a desk in a room of people with notebooks on shelves on the wall - Technology Software Update Policies

Technology Software Security Updates

Updated: 20 March 2025

The policy linked above explains how we manage software updates to keep our systems safe and secure. It outlines strict rules for keeping software current and protected against threats. All updates are handled quickly and carefully to reduce risks. This policy is part of our overall effort to protect company technology.

Fraud Management

Updated: 06 April 2025

The policy linked above explains how our organization detects, manages, and responds to fraud. It includes strong measures to prevent dishonest activity. This policy applies to all employees, contractors, and business partners. It supports a safe and trustworthy work environment for everyone.

Reporting Security Incidents, Vulnerabilities, Threats

Updated: 21 March 2025

The policy linked above explains how we handle reporting of security incidents, threats, and vulnerabilities across the organization. It includes clear steps for identifying and reporting issues quickly. The policy applies to all employees, contractors, and partners. Early reporting helps reduce risk and protect our systems.

Weapons and Security

Updated: 22 March 2025

The policy linked above explains our strict rules regarding weapons on company property and at work events. It lays out who may carry weapons, where, and when, with strong controls to keep everyone safe. This policy applies to employees, contractors, and visitors at all sites.

Engaging Security for New Projects/New Events

Updated: 21 March 2025

The policy linked above explains when and how to involve security in new projects and events. It ensures that risks are reviewed early and properly managed. This policy applies to all departments planning new work or activities. Involving security helps protect people, data, and property from the start.

Non-Public Information Security (Including PII)

Updated: 31 March 2025

The policy linked above explains how we protect non-public information across all areas of the organization. It includes strict rules for handling, sharing, and storing sensitive data. This policy applies to all employees, contractors, and partners. Protecting non-public information helps prevent data leaks and supports trust.

Social Media Usage

Updated: 24 March 2025

The policy linked above explains how social media use is managed to protect the company’s image, data, and employees. It includes clear guidelines for what is appropriate to share online. This policy applies to all employees using social media for work or personal use. It helps reduce risk and supports responsible communication.

Security Investigations

Updated: 23 March 2025

The policy linked above explains how the company conducts security investigations when issues or concerns are reported. It includes strict procedures to ensure fair and thorough reviews. This policy applies to all employees, contractors, and work locations. Investigations help protect people, property, and information from harm.

Email Security

Updated: 25 March 2025

The policy linked above explains how email is protected to keep company information secure and prevent cyber threats. It includes strong rules for using email safely at work. This policy applies to all employees and anyone using company email systems. It helps prevent data loss, phishing, and other risks.

Laptop/Desktop/Mobile Device Security

Updated: 06 April 2025

The policy linked above explains how laptops, desktops, and mobile devices are secured to protect company data and systems. It includes strict requirements for device use, access, and protection. This policy applies to all employees and anyone using company devices. It helps reduce risks like data loss or theft.

Onsite/Offsite Event Security

Updated: 06 April 2025

The policy linked above explains how security is managed for events held both onsite and offsite. It includes strong guidelines to protect people, property, and information during all events. This policy applies to employees, guests, and vendors involved in any company event. It helps ensure events are safe and well-controlled.

Supplier / Customer Due Diligence

Updated: 23 March 2025

The policy linked above explains how we evaluate suppliers and customers to reduce security and business risks. It includes strong procedures for reviewing and verifying business partners. This policy applies to all teams involved in selecting or managing suppliers and customers. It helps protect company operations and reputation.

Retail Loss Prevention

Updated: 06 April 2025

The policy linked above explains how the company prevents loss in retail operations through strong security measures. It covers all employees, stores, and related activities. The policy aims to protect products, reduce theft, and improve safety.

Recruiting and Onboarding

Updated: 07 April 2025

The policy linked above explains how recruiting and onboarding processes include strong security measures to protect the company. It applies to all new hires and contractors. The policy ensures proper screening and secure access to company resources.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Use of Our Facilities

Updated: 4 April 2025

The policy linked above explains how third parties use our facilities for events under strict security controls. It applies to all external groups hosting events on organization’s property. The policy helps ensure safety, security, and proper access during these events.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Handling of Cash or Checks

Updated: 8 April 2025

The policy linked above explains how the company manages the handling of cash with strict security measures. It applies to all employees involved in cash handling or processing. The policy helps prevent theft, loss, and errors to protect company assets.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Protecting VIPs (Physical)

Updated: 08 April 2025

The policy linked above explains how the company provides strong physical protection for VIPs during visits and events. It applies to all employees involved in VIP security or hosting. The policy ensures safety and smooth coordination to protect important guests.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Asset Inventory Management

Updated: 08 April 2025

This policy requires all physical and digital assets to be logged, labeled, and regularly reviewed. Only authorized personnel may assign, move, or remove assets. Loss, damage, or theft must be reported immediately. Accurate records help protect resources, reduce risk, and support compliance. Staff are responsible for safeguarding items under their control and must follow inventory procedures at all times.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Converged Security Vulnerability Management

Updated: 08 April 2025

The policy linked above explains how converged security vulnerability management is used to identify and address risks across all systems. It applies to all employees and technology resources. The policy supports a coordinated approach to keep the organization safe from threats.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Cyber Security – Center for Internet Security 18 Critical Controls

Sorry it’s a 2 Pager……Based on CISecurity.org great work on the 18 Critical Controls

Updated: 03 April 2025

The policy linked above explains how Cyber Security’s 18 Critical Controls guide our efforts to protect company systems and data. It applies to all employees and technology users. The policy ensures important security steps are followed consistently across the organization.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Secure Software Development

Updated: 08 April 2025

The policy linked above explains how secure software development practices are used to protect company applications and data. It applies to all developers and project teams. The policy ensures security is built into software from the start to reduce risks.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Warehouse Security (Worker Edition)

Updated: 13 April 2025

The policy linked above explains how security measures protect warehouse workers and facilities. It applies to all employees working in warehouses. The policy helps ensure safety, prevent theft, and maintain secure operations.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Construction Site Security (Worker Edition)

Updated: 13 April 2025

The policy linked above explains how security measures protect construction site workers and equipment. It applies to all employees working on construction sites. The policy helps ensure worker safety, prevent theft, and maintain secure job sites.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Security Personnel Training

Updated: 13 April 2025

The policy linked above explains how security personnel receive ongoing training to stay prepared and effective. It applies to all security staff and contractors. The policy ensures training covers the latest security practices and company standards.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Records Retention/Destruction

Updated: 29 April 2025

The policy linked above explains how the company manages records retention and destruction securely. It applies to all employees handling company documents and data. The policy ensures records are kept as needed and destroyed safely when no longer required.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Termination / Offboarding Personnel

Updated: 30 April 2025

The policy linked above explains how the company handles termination and offboarding of personnel with strict security measures. It applies to all employees leaving the organization. The policy ensures timely removal of access and protection of company information.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Insider Threat Management

Updated: 29 April 2025

The policy linked above explains how the company manages insider threats with strict security measures. It applies to all employees and contractors. The policy helps detect and prevent risks from within the organization.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Visitor (Invited / Not-Invited) Management

Updated: 30 April 2025

The policy linked above explains how the company manages both invited and uninvited visitors with strict security controls. It applies to all employees responsible for visitor access. The policy helps ensure safety by controlling who can enter company facilities.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Security Metrics

Updated: 03 May 2025

The policy linked above explains how the company tracks and manages security metrics using strict rules. It applies to all security functions across the organization. The policy helps measure performance and identify areas needing attention or improvement.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Child and Youth Protection

Updated: 05 May 2025

The policy linked above explains how the company protects children and youth through strong security measures. It applies to all employees involved in youth-related activities or programs. The policy helps ensure a safe and respectful environment for all young individuals.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Crisis Management and Communications

Updated: 06 May 2025

The policy linked above explains how the company manages crises and communicates during emergencies with clear and strict rules. It applies to all teams involved in emergency planning or response. The policy supports quick, organized actions to reduce harm and confusion.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Partnerships with Law Enforcement

Updated: 07 May 2025

The policy linked above explains how the company works with law enforcement using clear and strict security guidelines. It applies to teams that manage official contacts or share information with authorities. The policy supports safe, legal, and coordinated actions during investigations or emergencies.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Protecting VIPs (Cyber / Information Security)

Sorry it’s a 2 Pager

Updated: 25 May 2025

The policy linked above explains how the company protects VIPs through strong cyber and information security measures. It applies to all employees supporting VIP roles or data. The policy helps reduce risks to sensitive information and digital activity.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Security’s Role in BCP/DRP

Under Development

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Information Security For Podcasts, Speaking Events

Under Development

Jim, we had this issue _____?

Dude, you forgot about ____?

Jim, I need a policy on _____

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Basic Safety

Updated: 29 April 2025

The policy linked above explains how the company maintains basic safety across all areas of the organization. It applies to every employee, regardless of role or location. The policy supports a safe environment through clear procedures and regular oversight.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Emergency Evacuation/Shelter-In-Place

Updated: 01 May 2025

The policy linked above explains how the company handles emergency evacuations and shelter-in-place situations with clear, strong safety rules. It applies to all employees in every location. The policy supports fast, safe actions during emergencies like fires, threats, or severe weather.

Security Policy on a desk in a room of people with notebooks on shelves on the wall

Safety Metrics

Updated: 03 May 2025

The policy linked above explains how the company tracks and manages safety performance using clear and strong safety metrics. It applies to all departments that report or review safety data. The policy supports informed decisions by measuring safety trends and results over time.

Please, we need _____ quickly….