The University of SydneyPage 10Network Security ControlsPolicies and Procedures–Enterprise-wide Information Security Policy –Motherhood statements–Procedures –Detailed workflows–Buy-in (from executives and employees)–Review, enhancement and modification