Security - Templates & Policies

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.

Subject Access Request (SAR) – Rectification

Use this example as a starting point to document your subject access request procedure for rectification requests.

Employee Monitoring Policy – IT-Facing

Policy notifying employees of any monitoring that takes place on the systems they use.

Information Security Compliance Template

Use this template to manage your information security compliance requirements.

Security Governance and Management Communication Plan

This template will help you organize your various security communication efforts with different stakeholders.

Privileged Access Management (PAM) Vendor Demo Script

Use this demonstration script to provide Privileged Access Management (PAM) solution vendors with a consistent set of instructions, ensuring an objective comparison of...

Penetration Test RFP Template

Use this template to help create a request for proposal (RFP) for a Penetration Test according to your enterprise requirements.

Vulnerability Management Policy

This template will allow you to create a vulnerability management policy, which includes scope of the program and the high-level remediation process.
GET HELP Contact Us
×
VL Methodology