Security - Templates & Policies

IAM Vendor Demo Script Template

This template is designed to provide IAM vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease...

Security Operations Policy for Third-Party Outsourcing

Ensure secure operations of information processing with regards to implementation of an external third party.

Third-Party Security Policy Charter Template

Make sure you that your desire to outsource matches your organization's security mandate.

Personnel Security Policy – NIST

Use Info-Tech's Personnel Security Policy to document the personnel requirements prior to and during employment.

Security Operations Project Charter Template

Management buy-in is key to establishing an effective next-generation security operations program. The approval indicates that security is top-of-mind and that the...

Audit Log Review Policy

The audit log review policy will outline the standards across company systems for the review of audit logs.

Internal Controls Communication Plan Template

Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.

CISO Stakeholder Management Strategy Template

Once you have completed the CISO Stakeholder Power Map activity, use this tool to create a strategy to cultivate your stakeholder relationships, and manage each...

CISO Development Plan Template

Once you have assessed your competency, process, and technology gaps, use this tool to set goals and create an action plan to remediate any gaps.

PCI DSS Action Plan

Maintaining your compliance-related information in one central location is key in ensuring the success of your PCI compliance efforts. A primary document not only makes...
GET HELP Contact Us
×
VL Methodology