Security - Templates & Policies

Digital Risk Management Charter

Tackle digital risk profiling, management, and integration with a structured planning template that helps you document each step of the process and assign ownership and...

Cloud Security Architecture Archive Document

This template, part of the blueprint "Identify the Components of Your Cloud Security Architecture," will serve as a repository of information about your approach to...

Cloud Security Architecture Reference Model

Plot your findings from the Workbook and Archive Book to see the current state of your cloud security architecture, the risks, and where you still need to go.

Cloud Security Architecture Communication Deck

Socialize your findings to executive stakeholders and decision makers with a customizable, pre-populated communication deck. Explain the risks and the security services...

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Vulnerability Management Workflow

The workflows in the Standard Operating Procedure are provided in this raw working file for you to edit as needed.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.

Subject Access Request (SAR) – Erasure

Use this example as a starting point to document your subject access request procedure for erasure requests.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us