ISP Review Process

Summary

The following process describes how the company security policy will be reviewed on an annual basis (last Wednesday in October annually).

Note that security concerns improvement and revisions can be raised at any time though.

Assemble Review Team

Include a mix of roles such as a security officer, a lead developer, and an operations manager.

Document Collection

Ensure you have access to all current security policy documents.

Priot to Review

Prior to the session team members will read through the security documents. Use the basic security checklist (e.g., based on ISO/IEC 27001 standards to identify any missing elements.

Group Meeting / Discussion

Discuss any discrepancies, gaps, and areas of improvement noted during the initial review. Propose changes or updates needed. Remember that this is a continuous improvement process - make sure change happens in the right direction for the simpler and more helpful.

Revise Policy

Assign tasks to team members to update the policy document based on the discussion. Draft the revised policy. As markdown / git stored policies encourage people to diff read the documents.

Final Review and Approval

The review team examines the revised document. Approve if it meets the agreed standards or return for further revisions if necessary.

Implementation and Communication

Communicate the updated policy to all employees. Incorporate the updates into Implement training if necessary to ensure understanding and compliance.

Title ISP Review Process
Document Type Process
Document ID Version Issued
TSCOSER001 1 17/06/2024
Review Process N/A
Approved Issued Reviewer
PRB PRB PRB