Information Technology (IT) infrastructure security policies are represented in many types of policy documents, depending on the organizations network and infrastructure needs. As you review Chapter 10, it discusses common IT infrastructure policies, in an effort to establish policy baselines as they relate to different infrastructure domains.
What are some best practices organizations can observe when creating and maintaining domain policies?