Policies, Procedures, Standards, Laws, and Regulations
Key Takeaways
- Policies state management intent and required behavior at a high level.
- Standards define mandatory requirements such as approved encryption, password, or configuration rules.
- Procedures provide step-by-step instructions for performing tasks consistently.
- Guidelines are recommended practices unless adopted as mandatory by policy or standard.
- Laws and regulations come from legal authorities and can require specific protections, reporting, or record handling.
Policies, Procedures, Standards, Laws, and Regulations
Key Concepts
Security governance depends on clear documents. CC questions often describe a document and ask what type it is, or describe a problem and ask which document should guide the response. The key is to separate authority, requirement, and instruction.
A policy is a high-level statement approved by management. It says what must be done and why. For example, an acceptable use policy may state that company systems may be used only for authorized business purposes and that users must protect confidential information. A policy usually does not list every command or screen click.
A standard is a mandatory requirement that supports policy. If policy says data must be protected, a standard might require AES-256 encryption for stored confidential data, approved MFA methods for remote access, or a hardened baseline for servers. Standards make policy measurable.
A procedure gives step-by-step instructions. If policy requires account termination and the identity standard defines account controls, a procedure tells the administrator how to disable accounts, revoke tokens, remove group memberships, collect equipment, and record completion. Procedures support consistency and reduce mistakes.
A guideline is recommended advice. Guidelines are useful when flexibility is needed, such as secure meeting practices or preferred naming conventions. A guideline becomes mandatory only if policy or a standard makes it mandatory.
| Document type | Main question it answers | Example |
|---|---|---|
| Policy | What does management require? | Remote access must use approved secure methods |
| Standard | What specific rule must be met? | MFA is required for all remote access |
| Procedure | How is the task performed? | Steps to enroll a user in MFA |
| Guideline | What is recommended? | Suggested secure travel practices |
Laws and regulations are different because they come from governments or regulators. They may require breach notification, privacy protections, retention periods, safety controls, accessibility, financial safeguards, or sector-specific duties. Contractual requirements can also create obligations, such as security clauses in a customer agreement or vendor contract. A policy cannot override law. If an internal policy conflicts with a legal requirement, escalate to legal, compliance, or authorized leadership.
Exam Application
Scenario example: A company policy says confidential information must be protected. Auditors ask how laptops are configured. The relevant standard might require full-disk encryption, screen lock after 10 minutes, endpoint protection, and approved patch levels. The procedure would show technicians how to configure or verify those settings.
Scenario example: A user asks whether they may upload customer records into a new web tool. The best first answer is not a personal guess. Check data classification policy, acceptable use policy, vendor risk process, privacy requirements, and any applicable contracts or laws. If the tool is not approved, escalate for review rather than creating an informal exception.
Policy scenarios often test enforcement consistency. If an executive wants an exception from MFA because it is inconvenient, the best answer is to follow the exception process. Maybe a temporary compensating control is approved. Maybe the request is denied. What should not happen is an undocumented bypass just because the user is senior.
Document lifecycle matters. Policies and standards should be approved, communicated, reviewed, updated, and enforced. A password standard from 10 years ago may not reflect current technology or threat patterns. Procedures should match actual systems. If workers routinely ignore a procedure because it is impossible, governance should improve the procedure rather than pretending the paper control works.
For CC exam questions, identify whether the issue is about management direction, mandatory technical requirements, task instructions, optional advice, or legal obligation. Then choose the document or escalation path that has the right authority.
Which document type provides step-by-step instructions for disabling a departed employee account?
Which statements are correct? Choose two.
Select all that apply
Match each governance source to the best description.
Match each item on the left with the correct item on the right