Security - Templates & Policies

Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.

MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements. This...

Security Operations Program Cadence Schedule Template

Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary stakeholders.

Security Operations Collaboration Plan

The Security Operations Collaboration Plan identifies opportunities for optimization through collaboration and cross-training.

Security Incident Management Runbook: Malicious Email

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Security Incident Management Runbook: Distributed Denial of Service

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Incident Response Policy – NIST

Use Info-Tech's Incident Response Policy to specify the parameters of your incident response program.

Information Security Policy Charter Template

The Information Security Policy Charter is the “policy of policies” which outlines high-level security governance within the organization and the expectations associated...

Access Control Policy – NIST

Use Info-Tech's Access Control Policy to define and document the necessary access control levels and processes across your organization.

Media Protection Policy – NIST

Use Info-Tech's Media Protection Policy to define the level of protection mechanisms that will exist to protect your media.
GET HELP Contact Us
×
VL Methodology