Effective management of the deployed policy is achieved by combining all of the areas that we have discussed in this Lesson.

Once a policy has been developed and deployed, the focus should be on monitoring for violations, both internal and external. Changes to the deployed policy should happen only after the proposed change has been reviewed and approved by the security administrator or committee.