Security - Templates & Policies

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

Secure Cloud Usage Policy

Use this template to outline how an organization’s end users can securely use cloud services through acceptable usage guidelines.

General Security – User Acceptable Use Policy

Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.

System Acquisition, Development, and Maintenance Security Policy – ISO

The purpose of this policy is to ensure information is a forefront consideration throughout the lifecycle of information systems in the organization.

Stakeholder and Admin Privileged Access Management (PAM) Communication Decks

A significant component to the success of your Privileged Access Management (PAM) implementation is to achieve stakeholder sign-off, and get the support of admins who...

Privileged Access Management (PAM) RFP Template

A Request for Proposal (RFP) is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Identity and Access Management Procedural Policy

The use of authorization, identification, and authentication controls of identity and access management ensures that only known users make use of information systems...

Account Management Procedural Policy

Account management facilitates and regulates the access of information systems within a company. It establishes standards for administrating and managing accounts.

Threat Intelligence Alert Template

An alert educates internal stakeholders on gathered intelligence to better improve operations and guide high-level strategic decisions. It helps to communicate...
GET HELP Contact Us
×
VL Methodology