Security - Templates & Policies

Security Risk Management Presentation Template

This template offers a sample presentation of a risk management program, including an overview of the program and major risks.

System Acquisition, Development, and Maintenance Security Policy – ISO

The purpose of this policy is to ensure information is a forefront consideration throughout the lifecycle of information systems in the organization.

Threat and Risk Assessment Process Template

Use this template to document the exact process your organization uses when conducting a threat and risk assessment.

Security Operations Metrics Summary Document

Identify relevant metrics to assist in evaluating the success of your organization's incident response processes.

Internal Controls Monitoring RACI Template

Responsibilities for governance of the internal controls system should be integrated into the risk management and overall governance function of the IT organization. Use...

Data Protection Policy

Use Info-Tech's Data Protection Policy to define and document the necessary data privacy and protection controls.

Stakeholder and Admin Privileged Access Management (PAM) Communication Decks

A significant component to the success of your Privileged Access Management (PAM) implementation is to achieve stakeholder sign-off, and get the support of admins who...

Identity and Access Management Procedural Policy

The use of authorization, identification, and authentication controls of identity and access management ensures that only known users make use of information systems...

Security Incident Management Runbook: Credential Compromise

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Vulnerability Mitigation Process Template

This template will allow you to build out the exact process that is needed in order to mitigate against vulnerabilities. This includes the identification, prioritization,...
GET HELP Contact Us
×
VL Methodology