top of page

Integrated Proactive Security Policy

Threats can manifest themselves within an organization through three gates. This is shown in the so-called three-port model.

The Integrated Proactive Security Policy is developed based on the three-port model and the Threat Analysis.

The Security Policy consists of at least the following parts:

- Objective of Security
- The environment to be protected
- The operational environment
- The zoning methodology
- Tasks, powers, responsibilities of the departments involved
- Quality assurance

Underlying security plans and Standard Operating Procedures (SOPs) are developed based on the frameworks in the Integrated Proactive Security Policy.

OrcaSecure helps organizations with the development of an integrated proactive security policy

Please feel free to contact us for additional information or questions.

bottom of page