skip to content
B L O G

Understanding Cybersecurity Policies Governance Terms

/ 3 min read

Policies, Standards, Procedures, and Guidelines

Cybersecurity governance follows a structured hierarchy, ensuring security is applied consistently across an organization. The four levels in this hierarchy are1:

  • Policies (WHY) → Set the direction and purpose.
  • Standards (WHAT) → Define mandatory requirements.
  • Procedures (HOW) → Provide step-by-step implementation.
  • Guidelines → Offer recommended best practices.
Cybersecurity Governance Hierarchy

1. Policies – The WHY

A policy is a high-level statement that defines an organization’s security intent and objectives. It sets the rules that must be followed but does not explain specific technical details.

Example:

A Password Policy might state:

  • “All employees must use strong passwords and change them every 90 days.”

Policies provide the “WHY” behind security controls but do not dictate how to enforce them.


2. Standards – The WHAT

A standard defines the mandatory technical security requirements to enforce policies consistently across an organization.

Example:

A Password Standard might include:

  • Passwords must be at least 12 characters long.
  • Passwords must contain uppercase, lowercase, numbers, and symbols.
  • Account lockout after 5 failed attempts.

Standards answer the “WHAT” needs to be done to comply with policies.


3. Procedures – The HOW

A procedure is a step-by-step document explaining how to implement a policy or standard in practice.

Example:

A Password Reset Procedure may include:

  1. Go to the password reset portal.
  2. Enter your current password.
  3. Create a new password that meets the Password Standard.
  4. Confirm and save the new password.

Procedures answer “HOW” security rules are applied.


4. Guidelines – Best Practices

A guideline provides recommended (but not mandatory) best practices for security.

Example:

A Remote Work Security Guideline may suggest:

  • “Use a VPN when accessing company data from public Wi-Fi.”
  • “Enable multi-factor authentication (MFA) on all accounts.”

Guidelines are optional but help improve security when followed.


Summary Table

TermPurposeExample
PolicyDefines security rules (WHY)“Employees must use strong passwords and change them every 90 days.”
StandardDefines mandatory security (WHAT)“Passwords must be at least 12 characters long.”
ProcedureStep-by-step instructions (HOW)“Go to the password portal, enter old password, create a new strong password, confirm and submit.”
GuidelineBest practices (optional)“Use a VPN when accessing company data from public Wi-Fi.”

CISSP Exam Tips

If you are preparing for the CISSP (Certified Information Systems Security Professional) exam, understanding these terms is essential. Here are some key exam tips:

  • Policies = High-level rules and company expectations (e.g., “We must have strong passwords”).
  • Standards = Mandatory requirements (e.g., “Minimum password length: 12 characters”).
  • Procedures = Step-by-step implementation (e.g., “Go to settings → Change password”).
  • Guidelines = Suggested best practices (e.g., “Use a VPN when working remotely”).

CISSP Exam Tip:
You may see scenario-based questions asking which document (Policy, Standard, Procedure, or Guideline) applies in a given situation.

For example:

An organization requires encryption for all email communications. What type of security document is this?
Answer: Standard


Final Thoughts

By understanding the difference between Policies, Standards, Procedures, and Guidelines, organizations can improve their cybersecurity posture and reduce security risks.

  • Policies set the WHY (security goals).
  • Standards define the WHAT (mandatory rules).
  • Procedures explain HOW (implementation steps).
  • Guidelines provide best practices for security.

Following this hierarchy ensures security is clear, structured, and effective across an organization.

Footnotes

  1. Security Policies, Standards, Procedures, and Guidelines