Security - Templates & Policies

Security Risk Management Presentation Template

This template offers a sample presentation of a risk management program, including an overview of the program and major risks.

System Acquisition, Development, and Maintenance Security Policy – ISO

The purpose of this policy is to ensure information is a forefront consideration throughout the lifecycle of information systems in the organization.

Security Operations Metrics Summary Document

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.

Internal Controls Monitoring RACI Template

Responsibilities for governance of the internal controls system should be integrated into the risk management and overall governance function of the IT organization. Use...

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Privileged Access Management (PAM) Project Charter Template

The Project Charter serves as your central repository for business requirements, implementation project steps, and more. It is ideal for auditing purposes. Bring it to...

Security Governance Organizational Structure Template

This document provides exemplar organizational structure templates, as well as a RACI chart to help the CISO delegate responsibility for initiatives and tasks.

Privileged Access Management (PAM) RFP Template

A Request for Proposal (RFP) is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Security Incident Management Runbook: Credential Compromise

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Vulnerability Mitigation Process Template

This template will allow you to build out the exact process that is needed in order to mitigate against vulnerabilities. This includes the identification, prioritization,...
GET HELP Contact Us
×
VL Methodology