Register now or log in to join your professional community.
First of all, we have to understand that security policies are important to any organization because these policies can help in managing and protecting the organization information resources. In order to ensure that the network is secured and managed effectively, those policies go through a set of procedures and steps: Developing, documenting, implementing, reviewing and evaluating the policies.
There are specific criteria and guidelines for each step and sub-steps and levels. Each of those steps involves many detailed procedures that you can read in details about in IEEE or any other educational resources, articles, and researches.