ABSTRACT

The manual of style has been created, the list of initial topics has been put together, and the initial documents have been drafted. Now comes the hard part: the approval process and the actual implementation of the initial information security policy architecture.