Policies, Procedures, Standards, Laws, and Regulations

Key Takeaways

  • Policies state management intent and required behavior at a high level.
  • Standards define mandatory requirements such as approved encryption, password, or configuration rules.
  • Procedures provide step-by-step instructions for performing tasks consistently.
  • Guidelines are recommended practices unless adopted as mandatory by policy or standard.
  • Laws and regulations come from legal authorities and can require specific protections, reporting, or record handling.
Last updated: April 2026

Policies, Procedures, Standards, Laws, and Regulations

Key Concepts

Security governance depends on clear documents. CC questions often describe a document and ask what type it is, or describe a problem and ask which document should guide the response. The key is to separate authority, requirement, and instruction.

A policy is a high-level statement approved by management. It says what must be done and why. For example, an acceptable use policy may state that company systems may be used only for authorized business purposes and that users must protect confidential information. A policy usually does not list every command or screen click.

A standard is a mandatory requirement that supports policy. If policy says data must be protected, a standard might require AES-256 encryption for stored confidential data, approved MFA methods for remote access, or a hardened baseline for servers. Standards make policy measurable.

A procedure gives step-by-step instructions. If policy requires account termination and the identity standard defines account controls, a procedure tells the administrator how to disable accounts, revoke tokens, remove group memberships, collect equipment, and record completion. Procedures support consistency and reduce mistakes.

A guideline is recommended advice. Guidelines are useful when flexibility is needed, such as secure meeting practices or preferred naming conventions. A guideline becomes mandatory only if policy or a standard makes it mandatory.

Document typeMain question it answersExample
PolicyWhat does management require?Remote access must use approved secure methods
StandardWhat specific rule must be met?MFA is required for all remote access
ProcedureHow is the task performed?Steps to enroll a user in MFA
GuidelineWhat is recommended?Suggested secure travel practices

Laws and regulations are different because they come from governments or regulators. They may require breach notification, privacy protections, retention periods, safety controls, accessibility, financial safeguards, or sector-specific duties. Contractual requirements can also create obligations, such as security clauses in a customer agreement or vendor contract. A policy cannot override law. If an internal policy conflicts with a legal requirement, escalate to legal, compliance, or authorized leadership.

Exam Application

Scenario example: A company policy says confidential information must be protected. Auditors ask how laptops are configured. The relevant standard might require full-disk encryption, screen lock after 10 minutes, endpoint protection, and approved patch levels. The procedure would show technicians how to configure or verify those settings.

Scenario example: A user asks whether they may upload customer records into a new web tool. The best first answer is not a personal guess. Check data classification policy, acceptable use policy, vendor risk process, privacy requirements, and any applicable contracts or laws. If the tool is not approved, escalate for review rather than creating an informal exception.

Policy scenarios often test enforcement consistency. If an executive wants an exception from MFA because it is inconvenient, the best answer is to follow the exception process. Maybe a temporary compensating control is approved. Maybe the request is denied. What should not happen is an undocumented bypass just because the user is senior.

Document lifecycle matters. Policies and standards should be approved, communicated, reviewed, updated, and enforced. A password standard from 10 years ago may not reflect current technology or threat patterns. Procedures should match actual systems. If workers routinely ignore a procedure because it is impossible, governance should improve the procedure rather than pretending the paper control works.

For CC exam questions, identify whether the issue is about management direction, mandatory technical requirements, task instructions, optional advice, or legal obligation. Then choose the document or escalation path that has the right authority.

Test Your Knowledge

Which document type provides step-by-step instructions for disabling a departed employee account?

A
B
C
D
Test Your KnowledgeMulti-Select

Which statements are correct? Choose two.

Select all that apply

A standard can define mandatory encryption requirements
A policy states management expectations at a high level
A guideline always overrides a law
A procedure is usually only a vague statement of intent
Test Your KnowledgeMatching

Match each governance source to the best description.

Match each item on the left with the correct item on the right

1
Policy
2
Standard
3
Procedure
4
Regulation