In order to successfully implement a security strategy, management is required to have a security minded attitude. Security planning and management involves long term strategic planning and creating a corporate ICT policy. The next step consists of doing a risk analysis. After selecting the areas on which to focus, policies and procedures can be defined, as well as measurements that will be used to revise the effectiveness and efficiency of the countermeasures and security mechanisms. The resulting recommendations are then to be implemented, monitored and tested. The results of the compliance checks should eventually be used to revise the original analysis. All this is very similar to the traditional software development life cycle.
The life cycle of a security implementation can (partially7.1) be supported by software tools. They can also help in addressing a number of specific security issues. Here we can think of the wider use of software for monitoring purposes or for assisting in security implementations getting accredited against various (international) standards. Good tools should provide assistance for all aspects of information systems security: training and management of personnel, handling, storage and destruction of documents, dealing with technical issues, support planning and so on. They should contribute to ergonomic cognitive human-computer interaction, provide good facilities for modeling and representing information and be able to generate documentation and reports7.2. Additionally they can provide backtracking possibilities (for justification, as in ``why did we recommend this?'') or what-if analysis. The output they generate can relate to varying levels of assessment, from high level policy statements to compatible detailed low level recommendations. Last but not least, tools should support the every-day management of the operational security environment.