Back to Blog
GRC4 min read

Taming the Paper Tiger: GRC Policy Development That Works

Policies nobody reads don't reduce risk. Here's how to develop GRC policies and procedures that actually get followed.

Most organizations have policies. Fewer have policies that anyone follows.

The difference between documentation that satisfies auditors and documentation that actually reduces risk comes down to how policies are developed, communicated, and maintained.

Why Most Policies Fail

Policies fail for predictable reasons:

They're written for auditors, not employees. Legal language and comprehensive coverage don't help the developer who needs to know whether they can use a new SaaS tool.

They're not connected to reality. Policies describe how things should work. Procedures describe how things actually work. When these diverge, the policy becomes fiction.

Nobody knows they exist. A policy in a SharePoint folder that hasn't been opened in two years isn't governing anything.

They're never updated. Business changes. Technology changes. Regulations change. Policies that don't evolve become increasingly irrelevant.

What Good Policies Look Like

Effective policies share common characteristics:

Clear and Concise

A one-page policy that employees actually read beats a 50-page policy that nobody does. Focus on:

  • What behavior is expected
  • Why it matters
  • Who it applies to
  • What happens if it's not followed

Outcome-Focused

Bad policy: "All employees shall utilize approved encryption mechanisms for data at rest in accordance with organizational security standards."

Good policy: "Encrypt all customer data. Use [these approved tools]. Ask Security if you're unsure."

Connected to Procedures

Policies state what should happen. Procedures explain how to make it happen. Both need to exist, and they need to match.

If your policy requires quarterly access reviews, your procedure should explain exactly how to conduct one: who runs it, what systems are covered, how to document it, and where to report issues.

Building Your Policy Framework

Start with What You Actually Need

Most small organizations need a handful of core policies:

  • Information Security Policy — Overall security approach and responsibilities
  • Acceptable Use Policy — What employees can and can't do with company systems
  • Access Control Policy — How access is granted, reviewed, and revoked
  • Incident Response Policy — What happens when something goes wrong
  • Data Classification Policy — How different types of data should be handled

You can add more as you grow. Starting with too many leads to policies that exist but aren't maintained.

Write for Your Audience

Technical policies for the engineering team can include technical details. Company-wide policies should be readable by anyone.

Use plain language. Define acronyms. Give examples. If a policy requires a law degree to understand, it won't be followed.

Get Input from Stakeholders

Policies written in isolation often miss practical realities. Before finalizing:

  • Have representatives from affected teams review drafts
  • Ask: "Can we actually do this?"
  • Identify conflicts with existing tools or workflows
  • Adjust based on feedback

Policies that people helped create are policies people will follow.

Make Them Findable

Policies only work if people can find them. Options:

  • Dedicated policy section in your wiki or intranet
  • Links from onboarding documentation
  • References in security training
  • Easy search functionality

If someone wonders "what's our policy on X," they should be able to find the answer in under a minute.

Maintaining Policies Over Time

Schedule Regular Reviews

Every policy should have:

  • An owner responsible for keeping it current
  • A review schedule (annual at minimum)
  • A documented last-reviewed date

Calendar reminders for policy reviews prevent drift.

Update When Things Change

Don't wait for scheduled reviews when significant changes happen:

  • New regulations affecting your industry
  • Major technology changes
  • Organizational restructuring
  • Lessons learned from incidents

Track Changes

Version control for policies matters. You should be able to answer:

  • What changed between versions?
  • When did the change happen?
  • Why was the change made?
  • Who approved it?

This is audit evidence and institutional memory.

The Compliance Connection

Auditors don't just want to see policies—they want to see that policies are:

  • Approved by appropriate leadership
  • Communicated to relevant employees
  • Reviewed and updated regularly
  • Actually followed in practice

A well-maintained policy framework satisfies compliance requirements while genuinely reducing risk. That's the goal: policies that work for auditors and for your organization.


Need help developing or updating your policy framework? Our GRC Advisory services include policy development and review. Let's talk.

Jonathan Carpenter
Jonathan Carpenter
Founder, Anchor Cyber Security
Share:

Want to discuss this topic?

Let's talk about how these insights apply to your organization.

Get in Touch