Skip to article frontmatterSkip to article content
Site not loading correctly?

This may be due to an incorrect BASE_URL configuration. See the MyST Documentation for reference.

Design Good Security Policies

What Good Policies Identify

Well-designed security policies clearly identify three essential components:

Benefits of Security Policies

Effective security policies deliver tangible organisational benefits, including:

Policies as a Soft Control

Security policies are a soft form of protection. Unlike technical controls such as firewalls or encryption, policies alone provide no direct tangible defence against an attacker. However, because human factors and security awareness are critically important in managing security risks, not having security policies is not an option. Policies shape behaviour, clarify expectations, establish accountability, and create a culture where security is everyone’s responsibility.

Reuse Rather Than Reinvent

Creating security policies from scratch should generally be avoided. Instead, you should use and reuse proven existing security policies. This approach:

Security Policies vs Security Principles

The difference between policies and principles comes down to level of abstraction and purpose: principles guide thinking, while policies enforce action.

Security PrinciplesSecurity Policies
NatureHigh-level, foundational ideasFormal, organisation-specific rules
PurposeGuide thinking and decision-makingEnforce action and compliance
ScopeBroad, enduring, technology-agnosticSpecific, measurable, and enforceable
ExampleLeast privilege, defence in depth, fail securely“Multi-factor authentication is required for all remote access”

Security principles describe what good security looks like and provide direction during design and decision-making. They are guiding philosophies that shape security culture and architecture.

Security policies, by contrast, translate those principles into concrete requirements. They define what must be done in practice. For instance, a policy might require multi-factor authentication for all remote access, mandate specific encryption standards, or specify how data must be handled and classified based on its sensitivity.

In short: principles are guiding philosophies, while policies are enforceable rules. A strong Security by Design approach connects the two seamlessly—principles inform the creation of policies, and policies ensure that principles are consistently applied across real-world operations.

Learn More