Security - Templates & Policies

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Tabletop Exercises Package

Test your incident response communications plan by running these sample scenarios.

Secure Cloud Usage Policy

Use this template to outline how an organization’s end users can securely use cloud services through acceptable usage guidelines.

General Security – User Acceptable Use Policy

Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.

Privileged Access Management (PAM) RFP Template

A Request for Proposal (RFP) is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Account Management Procedural Policy

Account management facilitates and regulates the access of information systems within a company. It establishes standards for administrating and managing accounts.

Email Security Gateway Vendor Demo Script

Allowing vendors to run a product demonstration without your guidance will only highlight their strengths and present a subjective and skewed view of their product offering.

Security Assessment Procedural Policy

​This Security Assessment Policy applies to all information systems and information system components of the organization.

Security Incident Management Runbook: Ransomware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Risk Management Program Manual

Formalizing a risk management program requires creating repeatable and iterative processes, and documenting best practices. Create a comprehensive manual to serve as the...
GET HELP Contact Us
×
VL Methodology