Security - Templates & Policies

IAM Procurement Project Charter Template

Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.

SaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential SaaS vendor.

Security Operations Policy for Third-Party Outsourcing

Ensure secure operations of information processing with regards to implementation of an external third party.

Compliance Policy – ISO

The purpose of this policy is to ensure proper measures are in place to avoid non-adherence to information security compliance requirements – legal, contractual,...

Information Acceptable Use Policy

The information acceptable use policy outlines standards for appropriate use of corporate information and IT equipment.

Risk Report

Create a succinct, impactful document that summarizes the outcomes from the risk assessment and highlights the IT risk council’s top recommendations to the senior...

Data Audit Interview Schedule

​Use the Data Audit Interview Schedule to ensure you organize interviews with the proper data audit participants.

CISO Stakeholder Power Map Template

Identify and manage key stakeholders to improve your relationships within the organization.

BYOC Acceptable Use Policy

The purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a...

DR Team Build Sheet

Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...
GET HELP Contact Us
×
VL Methodology