I have a question about the level of detail required in IT policies, especially for aspects like encryption and Multi-Factor Authentication (MFA). Currently, our MFA policy states, "MFA is enabled for the organization." Is this enough since MFA is set up, or should it detail when users will encounter prompts and mention that we use Microsoft Authenticator? Similarly, the encryption policy says, "Devices should be encrypted to minimize risks associated with data breaches and other security incidents." Is this level of detail adequate, given that we use BitLocker for device encryption? Can policies remain vague once they are in place?
3 Answers
Policies can often remain somewhat vague, especially when the specifics don't significantly impact implementation or understanding. For instance, with your MFA policy, as long as everyone knows MFA is active, there's usually no need to go into granular detail about prompts or the apps used. The goal of a policy is to set a framework rather than act as a manual that covers every single aspect. Just ensure that essential components that might lead to security issues are made clear.
In general, policies should steer clear of specifying exact products and implementations. Instead, keep the policies vendor-neutral to avoid tying importance to any specific tool. Save the nitty-gritty for procedures, where you can outline the specifics without risking frequent policy changes.
It really depends on the context of your policies. If they leave room for confusion or questions, that's a sign you may need to elaborate more. Some policies need to be crystal clear, especially the ones involving compliance and security measures. A good practice is to define the purpose of each policy at the start so everyone understands the intent — that clarity helps frame what's needed within the policy.

Related Questions
Can't Load PhpMyadmin On After Server Update
Redirect www to non-www in Apache Conf
How To Check If Your SSL Cert Is SHA 1
Windows TrackPad Gestures