Skip to content

Security Policy Draft (Capital One 2019)

Use this to draft or update an enterprise security policy; defines required behavior and controls in policy language and supports consistency and auditability.


Hallucinated writing examples

Scenario. In November 2020, following the OCC Consent Order (August 6, 2020) and the July 2019 incident (time), the Security Director (role) is tasked with drafting an enterprise security policy for cloud configuration and boundary security (type) for the CISO, Legal, and the Board Audit Committee (audience). The policy is required under the Consent Order and must address the root cause of the incident (WAF misconfiguration and configuration governance). The draft must be supportable by standards and evidence.

ENTERPRISE SECURITY POLICY — DRAFT

Policy title: Cloud Configuration and Boundary Security
Version: 1.0 (Draft)
Owner: Chief Information Security Officer
Effective date: Upon approval
Last reviewed: November 2020
Context: Post–July 2019 incident; OCC Consent Order (OCC NR 2020-98)

Purpose and scope. This policy establishes requirements for the design, change, and monitoring of cloud perimeter and boundary controls to reduce the risk of unauthorized access and to support audit and regulatory expectations, including those set forth in the Consent Order issued by the Office of the Comptroller of the Currency on August 6, 2020. The July 2019 cybersecurity incident involved exploitation of a misconfiguration in our AWS-hosted web application firewall (WAF); this policy is intended to prevent recurrence and to demonstrate control effectiveness to the OCC and other stakeholders. It applies to all business units and technology teams responsible for cloud-hosted systems that process [designated data].

Policy statement. The organization shall manage cloud perimeter and boundary controls (including WAF, routing, and exposure rules) using config-as-code with mandatory peer review. Changes shall be authorized, documented, and monitored for drift. Exceptions shall be requested, approved, and documented with rationale, mitigation, and revisit date. This approach aligns with the Consent Order's requirement for strengthened cloud security and risk management.

Roles and responsibilities. The CISO owns this policy and approves exceptions within defined criteria. Technology owners implement and operate controls per supporting standards. Risk owners acknowledge risk acceptances. Audit may verify compliance. The Security Director is responsible for maintaining supporting standards and evidence of implementation.

Requirements. (1) Designated perimeter controls shall be defined in version-controlled configuration. (2) All changes shall follow the approved change workflow (e.g., pull request, review, approval). (3) Drift detection shall be enabled; exceptions remediated or formally accepted with revisit date. (4) Baselines and exceptions shall be documented and reviewed per [cadence]. Related documents: [Cloud Configuration Standard]; [Change Management Procedure]; [Risk Acceptance Procedure]. This policy shall be reviewed annually. Non-compliance shall be reported and remediated; repeated or material non-compliance may result in [consequences per HR/governance]. Revision history: [Version, date, summary.]


Official document (policy expectations in enforcement)

The OCC consent order required Capital One to strengthen risk management, board reporting, and cloud security—areas that are typically governed by policy. Regulators expect documented policy that is implemented, reviewed, and evidenced.

Policy drafts are internal; consent orders and handbooks show what domains regulators expect to be covered by policy.


Writing analysis

How security policy drafts are typically structured

  • Purpose and scope — Why the policy exists; who and what it covers.
  • Policy statement — High-level requirements (what must be true).
  • Roles and responsibilities — Who owns the policy; who implements and enforces.
  • Requirements — Specific, testable requirements (can be in policy or linked standards).
  • Exceptions — How exceptions are requested, approved, and documented.
  • Review and enforcement — How often reviewed; consequences of non-compliance.
  • Related documents — Standards, procedures, and guidelines.
  • Revision history — Version, date, and change summary.

What to emulate

  • Policy as the top-level artifact; standards and procedures implement it. Keep policy concise; put detail in standards.
  • Each requirement testable or auditable so “policy in practice” can be evidenced (training, exceptions, reviews).
  • Clear exception process so risk acceptance is documented, not implicit.

What to improve

  • Avoid policy that cannot be enforced or evidenced; tie to controls and metrics.
  • Align with regulatory and framework language (e.g., OCC, NIST) so auditors see expected concepts.
Last updated: