Sign up for our newsletter

Thank you! Your submission has been received!

Oops! Something went wrong while submitting the form.

Information Security Program Overview Template

An introduction to information security program creation and maintenance


(District/Organization) is making a demonstrated commitment to improve information security throughout the organization. To this end, (District/Organization) is in process of developing several information security policies that will form the governance and foundation for the (District/Organization) Information Security Program (*see Appendix for a preliminary list of polices to be developed). For the information security policies to provide value they must be approved by management and adopted throughout the organization. To ensure that all aspects of Information Security are covered in the new Information Security Program, the program will be based on the international standard for Information Security Code of Practice for Information Security Management (ISO/IEC 27002:2013).

This document provides a conceptual plan towards adoption and full implementation, and some general guidance regarding what works and what does not. The plan is based on experiences with hundreds of other organizations across a spectrum of sizes and industries.


(District/Organization) Information Security Program

There are multiple reasons or purposes for the (District/Organization) Information Security Program:

  • Ensure that appropriate measures are taken to protect the confidentiality, integrity, and availability of information entrusted to the organization by its customers, business partners, and stakeholders.
  • Provide management with assurance that the organization is doing what it should with respect to information security.
  • Provide customers, business partners, and stakeholders with assurance that (District/Organization) is protecting their information.
  • Assist in compliance with regulatory requirements; current and expected.

Information Security Program Lifecycle

The (District/Organization) Information Security Program will be based on sound risk management principles and a lifecycle of continuous improvement as depicted in the (District/Organization) Security Program Lifecycle in Fig.1.

what are the steps of the information security program life cycle

Figure1: Steps of the Information Security Program Lifecycle

Develop to Approve

At this point in the lifecycle, (District/Organization) is planning what policies are needed and what they must contain. Once the policies are finished being developed they will move on for approval by the board of directors. The policy approval process is depicted in Figure 2.

information security program life cycle

Figure 2: (District/Organization) Information Security Policy Approval Process.

There are three steps to security policy approval. First, the policies are drafted by the Information Security Working Group. Next, the draft policies are reviewed, commented on, and edited by the Information Security Committee. The final step is submitting the published policy documents to the Board of Directors for formal approval.

Approve to Adopt

At this point in the lifecycle, (District/Organization) is planning how best to adopt the policies that have been developed and are subject to approval.

information security program life cycle

There are five steps that are essential for (District/Organization) to move to adoption of the Information Security Program; Communication Plan, Supporting Documentation, Assess Gaps, Develop Plans, and Implement.

Communication Plan Development

Perhaps the most important first step in moving from approval of information security policies to adoption of security policies is the determination and planning for how (District/Organization) is going to best communicate to management, employees, contractors, and others.

The communication plan will help us to ensure that we communicate with the organization consistently, effectively, regularly, and as transparently as possible. The plan lays out who we communicate with, when we must communicate, what we must communicate, and how we must communicate.

The communication plan is a live document that changes with the organization; in developing the communication plan, we will need to identify methods for which we will measure its effectiveness.

information security program life cycle


The redevelopment and implementation of a new (District/Organization) Information Security Program is a new initiative for the organization; making an appropriate and effective announcement is important.


Expecting people to follow the direction provided by the (District/Organization) policies without proper training is bound to fail. Effective information security training is fresh, relevant, and develops a sense of ownership among the (District/Organization) community.


Information security is not closely integrated with the (District/Organization) culture today. Ongoing awareness campaigns are used as a method of reminding people of their role in protecting sensitive information and keeping people up-to-date on information security news. Awareness campaigns can (and should) be fun and interactive.


Changes to processes and technologies that affect people must be communicated to people.  Often people are fine with change, as long as they understand the need for change.  In general, any change made to any (District/Organization) process or technology must be communicated to all of the people affected by the change, before, during, and after the change.

(District/Organization) management needs to be notified regularly and kept up-to-date on significant events.


The (District/Organization) Information Security Program is not any one person’s responsibility, and it is not “owned” by any one person. The (District/Organization) Information Security Program is everybody’s responsibility and it is “owned” by everyone. We need to encourage people to participate, and their feedback is critical to our success.

Feedback must be sought and received from [Company Address] management regularly.

Develop Supporting Documentation

Policies provide the governance and direction for the (District/Organization) Information Security Program, supporting documents provide the details for how to comply with policies.

introduction to information security


(District/Organization) guidelines provide directions to comply with policy that are not mandatory. Guidelines provide “guidance”. Guidelines may apply to all persons, certain persons within a specific department, or individuals across departments. Most guidelines are developed by information technology personnel.


(District/Organization) standards provide mandatory directions and/or boundaries for policy compliance. Specific technical details may be included in certain standards. Standards may apply to all persons, certain persons within a specific department, or individuals across departments. Most standards are developed by information technology personnel.


Procedures provide step-by-step directions to complete certain tasks. Procedures are mandatory.  Procedures may apply to all persons, certain persons within a specific department, or individuals across departments. Procedures are developed by anyone that has a need to carry out a task in a repeatable and efficient manner.

Assess Compliance Gaps

There are many places within (District/Organization) where there may be non-compliance with sound information security principles and stated policy. At this step of the adoption, the policies are reviewed in detail with the focus on identifying individual policy statements for which (District/Organization) is not compliant. The non-compliant policy statements are put into context and perspective at the Develop Plans stage of adoption.

Develop Plans

The non-compliant policy statements are organized into categories and prioritized. Plans and projects are developed, resources identified, and timelines established.

It is important to develop projects and plans that are most efficient; for example, a single project that addresses dozens of non-compliant policy statements is much more efficient than multiple projects that address a few non-compliant policy statements.

Each project plan must be accompanied with a notification plan that fits with the original communication plan (covered above).


The last stage in the adoption of the (District/Organization) information security policies is implementation.  Implementation consists of execution and documentation of the projects that were developed in the previous stage (Develop Plans) of adoption. At the end of implementation of controls or processes, documentation should be prepared to ensure the ongoing management of the controls or processes remains in compliance with stated policy objectives.

introduction to information security

Adopt to Manage

At this point in the lifecycle, (District/Organization) is to manage and reinforce compliance of the information security policies that were implemented during the adoption phase of the lifecycle.  Management of the program may include but not limited to reviewing audit results, logs, holding the security committee meetings that are noted in policy, etc.

Manage to Assess

At the Assess phase of the lifecycle, the (District/Organization) information security program is reviewed to verify if the policies are still relevant or need to be updated.  Policies should be assessed or reviewed at least annually or when a significant event causes the need for a change to policy.


Questions regarding this plan can be directed to: Information Security Committee

Appendix: (District/Organization) Policy Checklist

The following checklist contains policies that should* be created to establish a functional and effective information security governing framework for (District/Organization).

*Based upon experience with similar organizations and the results of the administrative controls review conducted (District/Organization).

Policy Checklist

Some of the policies mentioned in this list may include re-writes or modifications to existing documentation as opposed to new policies.

Information Security Policy

  • Acceptable Use Policy
  • Asset Management Policy
  • Audit Policy
  • Change Control Policy
  • Disaster Recovery Policy
  • Encryption Management Policy
  • Identity and Access Management Policy
  • Incident Management Policy
  • Information Classification and Management Policy
  • Network Management Policy
  • Personnel Security Policy
  • Physical Security Policy
  • Risk Management Policy
  • Security Training and Awareness Policy
  • System Development and Acceptance Policy
  • Vendor Management Policy
  • Vulnerability Management Policy

Estimate your score or book free demo today

Estimator | Get a Demo

Please fill out the form below to access your free download.

Thanks! Your download is ready.

Oops! Something went wrong. Please try again.
Sign up for our newsletter

Receive monthly news and insights in your inbox. Don't miss out!

Industry insights