Security Operations - Templates & Policies

Firewall Policy

Use this policy template to define and support your organization's firewall operations management.

Design a Tabletop Exercise to Support Your Security Operation – Inject Examples

Info-Tech has developed a portfolio of inject examples that members can leverage to get started and build upon in order to implement their own tabletop exercise capability.

MSSP RFP Template

An RFP is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of requirements. This...

Security Operations Program Cadence Schedule Template

Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary stakeholders.

Security Operations Collaboration Plan

The Security Operations Collaboration Plan identifies opportunities for optimization through collaboration and cross-training.

Incident Response Policy – NIST

Use Info-Tech's Incident Response Policy to specify the parameters of your incident response program.

Incident Management Runbook: Credential Compromise

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Incident Management Runbook: Distributed Denial of Service

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Incident Management Runbook: Malware

Incidents can be categorized into runbooks where a standardized response process is defined, eliminating inconsistency and ambiguity while increasing operational...

Security Incident Management RACI Tool

Assign responsibilities and deadlines for incident response and the management process.
GET HELP Contact Us
×
VL Methodology