IT host security policy
To design your own IT host security policy, consider
the security recommendations by:
- Security Technical Implementation Guides (STIGs)
- Federal Risk and Authorization Management Program (FedRAMP)
- Payment Card Industry Data Security Standard (PCI DSS)