“A security policy is a document that states in writing how a company plans to protect the company’s physical and information technology assets. A security policy is often considered to be a “living document”, meaning that the document is never finished, but is continuously updated as technology and employee requirements change.” (Rousse; 2007)
The same description is appropriate and can be migrated to define a similar infrastructure for multiple businesses in a global network or exchange. The need for structure decides that policies should exist.
“The emerging Internet of Everything is set to heighten the security burden for device makers, software vendors and the numerous organizations that will rely on an interconnected network of smart devices to support operations and serve customers.” (Trend Micro)
To fully mediate the circumstances that influences or are influenced by the Internet and everything in it, it is important to setup up appropriate rules to exchange and transfer information securely, safely and quickly – appropriately termed security policies.
Rousse, Margaret; Definition: Security Policy; http://searchsecurity.techtarget.com/definition/security-policy; May 2007
Budd, Christopher; The Internet of Everything; http://blog.trendmicro.com/internet-everything-possibly-go-wrong/; August, 2013
Trend Micro; Securing the Internet of Everything against surveillance and attacks; http://blog.trendmicro.com/securing-internet-everything-surveillance-attacks/; December 13, 2013
Medugno, Richard; In the Age of “Internet Everywhere,” Being Cyber Savvy is Easy as PIE; http://blog.trendmicro.com/cyber-savvy-easy-pie/?cm_mmc=Social-_-Twitter-_-TW:Trend%2BMicro-_-sf20870076#sf20870076