Security - Templates & Policies

Information Security Charter

Without a charter to control and set clear objectives for security, the responsibility of security governance initiatives will likely be undefined within the enterprise,...

Recovery Operating Procedures Template

Use this Recovery Operating Procedures Template in conjunction with the Optimize Backup Operations with a Recovery Services Plan Storyboard to document operating...

Data Classification Policy

Use this template to document a formal policy to define your data classification program.

Asset Management Policy – ISO

The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.

Cryptography Policy – ISO

The purpose of this policy is to ensure correct use of cryptography to protect the confidentiality, authenticity, and integrity of the organization’s information.

Identification and Authentication Policy – NIST

Use Info-Tech's Identification and Authentication Policy to document the requirements and methods in which systems will be accessed.

Application Security Procedural Policy

The purpose of an application security policy is to guide developers through the software development lifecycle to assure employee access to the computing resources and...

IAM System RFP Template

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

System and Communications Security Policy – NIST

The purpose of this policy is to ensure security is a key consideration in network management and in the transfer of information in and out of the organization.

Information Security Governance and Management Business Case

Use this template to justify the business value of implementing or improving a security governance and management program.
GET HELP Contact Us
×
VL Methodology