Security - Templates & Policies

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.

IAM System RFP Template

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

System and Communications Security Policy – NIST

The purpose of this policy is to ensure security is a key consideration in network management and in the transfer of information in and out of the organization.

Physical Protection Policy – NIST

Use Info-Tech's Physical Security Policy to outline the measures taken to protect physical security.

Information Security Governance and Management Business Case

Use this template to justify the business value of implementing or improving a security governance and management program.

eDiscovery Procedure for Legal Search

Use this template to describe the activities and responsibilities required to effectively respond to a discovery request.

Data Classification Policy

Use this template to document a formal policy to define your data classification program.

Cryptography Policy – ISO

The purpose of this policy is to ensure correct use of cryptography to protect the confidentiality, authenticity, and integrity of the organization’s information.

Security Incident Management Policy

The purpose of this policy is to ensure proper recognition, management, and communication of security events and weaknesses through a formal process.
GET HELP Contact Us
×
VL Methodology