Question 2 of 10

Describe the lifecycle of a security policy from creation to retirement. What makes a security policy effective, and how do you ensure policies are actually followed rather than sitting on a shelf unread?