Security - Templates & Policies

Data Protection Procedural Policy

The data protection policy will outline the standards for protecting corporate data from any risk that it may be exposed to.

Asset Management Policy – ISO

The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Removable Media Acceptable Use Policy

The removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable...

Server Configuration Policy

The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.

Systems Monitoring and Auditing Procedural Policy

System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...

BYOC Acceptable Use Policy

The purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a...

Operations Security Policy – ISO

The purpose of this policy is to ensure the secure operations of information processing facilities within and related to an organization.

Audit Log Review Policy

The audit log review policy will outline the standards across company systems for the review of audit logs.

Email Acceptable Use Policy

The email acceptable use policy outlines the standards for appropriate use of corporate email accounts.
GET HELP Contact Us
×
VL Methodology