Security - Templates & Policies

Security Awareness and Training Feedback Template

This template will provide you with example survey questions to ask an organization’s end users in order to collect feedback on security training.

Training Materials – Passwords

This is one of eight security awareness and training templates that can be used to educate end users on best practices. This presentation focuses on passwords.

Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Internal Controls Communication Plan Template

Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.

Record of Processing Template

As a data controller or processor, align your required record of processing requirements to your activities.

BYOC Acceptable Use Policy

The purpose of the BYOC Acceptable Use Policy is to define standards, procedures, and restrictions for end users who are connecting a personally-owned device to a...

Security Incident Management Runbook: Distributed Denial of Service

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Vulnerability Scanning Tool RFP Template

Use this template to help create a request for proposal (RFP) for a Vulnerability Scanning Tool according to your enterprise requirements.

DR Team Build Sheet

Recovering from a disaster cannot occur without having key people in place to bring system, equipment, and services back online. Use this worksheet to identify team...

Physical and Environmental Policy – ISO

The purpose of this policy is to ensure proper measures are in place to prevent unauthorized physical access or damage to the organization’s information and facilities.
GET HELP Contact Us
×
VL Methodology