Security - Templates & Policies

Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Security Risk Management Summary Template

This template offers a summary report of a risk management program, including an overview of the program and major risks.

Ransomware Email Communication Template

This template provides an easy-to-understand email that you can send to your user base to educate them on ransomware and how to prevent infection.

Security Governance Organizational Structure

A formalized security organizational structure assigns and defines the security roles and responsibilities of different members in the organization. Clarity of...

Record of Processing Template

As a data controller or processor, align your required record of processing requirements to your activities.

System Maintenance Policy – NIST

Use Info-Tech's Maintenance Policy to define how system maintenance procedures will operate.

Identity and Access Management Procedural Policy

The use of authorization, identification, and authentication controls of identity and access management ensures that only known users make use of information systems...

Security Incident Management Charter Template

Management buy-in is key to effective incident response. The approval indicates that security is top-of-mind and that the process aligns with business objectives....

Physical and Environmental Policy – ISO

The purpose of this policy is to ensure proper measures are in place to prevent unauthorized physical access or damage to the organization’s information and facilities.

Security Initiative Skills Guide

Use this template to document future initiatives skill needs.
GET HELP Contact Us
×
VL Methodology