Organize all findings into a comprehensive security policy. Communicate the new security policy to stakeholders. Maintain awareness of the security policy.
©Copyright IBM Corp. 2005, 2008. All Rights Reserved.