Security - Templates & Policies

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Cloud Security Communication Deck

Use this template to outline the organization’s security understanding and requirements of the proposed cloud migration.

General Security – User Acceptable Use Policy

Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...

Information Security Risk Management Template

Use this template to build your information security risk management process.

IaaS and PaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.

Information Security Strategy Communication Deck

Use the Information Security Strategy Communication Deck to present the results of the security strategy to stakeholders, and show how the security program will improve...

Security Governance Organizational Structure Template

This template will help you to implement or revise your organizational structure.

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us