Overview of Info-Tech's DRP development workflow.
|
1
|
The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.
|
|
System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...
|
8
|
Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...
|
3
|
The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.
|
6
|
The data protection policy will outline the standards for protecting corporate data from any risk that it may be exposed to.
|
8
|
Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.
|
3
|
Security pressure posture analysis helps your organization assess your real security context and enables your organization to invest in the right security functions while...
|
3
|
This template is used to conduct stakeholder interviews for the purpose of confirming compliance.
|
2
|
This template is used to manage documentation attributes for better tracking, it also contains a checklist to ensure documents can be properly tracked and easily located...
|
1
|