Security - Templates & Policies

Risk Assessment Policy – NIST

Use Info-Tech's Risk Assessment Policy to define the parameters of your risk assessment program, including the frequency of evaluation.

Recovery Operating Procedures Template

Use this Recovery Operating Procedures Template in conjunction with the Optimize Backup Operations with a Recovery Services Plan Storyboard to document operating...

Data Classification Policy

Use this template to document a formal policy to define your data classification program.

Asset Management Policy – ISO

The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.

Cryptography Policy – ISO

The purpose of this policy is to ensure correct use of cryptography to protect the confidentiality, authenticity, and integrity of the organization’s information.

Identification and Authentication Policy – NIST

Use Info-Tech's Identification and Authentication Policy to document the requirements and methods in which systems will be accessed.

Application Security Procedural Policy

The purpose of an application security policy is to guide developers through the software development lifecycle to assure employee access to the computing resources and...

IAM System RFP Template

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Security Incident Management Policy

The purpose of this policy is to ensure proper recognition, management, and communication of security events and weaknesses through a formal process.

Information Security Governance and Management Business Case

Use this template to justify the business value of implementing or improving a security governance and management program.
GET HELP Contact Us
×
VL Methodology