Security - Templates & Policies

IaaS and PaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.

Security Risk Governance Responsibilities and RACI Template

This template will allow you to structure how your risk management groups, including the board of directors and the IT team, will function and own different process areas.

Information Security Risk Management Template

Use this template to build your information security risk management process.

Privileged Access Management (PAM) Project Charter Template

The Project Charter serves as your central repository for business requirements, implementation project steps, and more. It is ideal for auditing purposes. Bring it to...

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Information Security Strategy Communication Deck

Use this template to present the results of your information security strategy planning to your stakeholders.

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.

Threat Intelligence Malware Runbook Template

Threats can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Incident Response Policy – NIST

Use Info-Tech's Incident Response Policy to specify the parameters of your incident response program.

Contingency Planning Procedural Policy

Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.
GET HELP Contact Us
×
VL Methodology