Identity & Access Management - Templates & Policies

Identification and Authentication Policy – NIST

Use Info-Tech's Identification and Authentication Policy to document the requirements and methods in which systems will be accessed.

IAM Procurement Project Charter Template

Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.

IAM System RFP Template

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

IAM Vendor Demo Script Template

This template is designed to provide IAM vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease...

MFA Policy

The MFA policy ensures that more than one method of authentication is approved from more than one category of credentials when accessing data, transaction, or logging in...

Identity and Access Management Procedural Policy

The use of authorization, identification, and authentication controls of identity and access management ensures that only known users make use of information systems...

Privileged Access Management (PAM) Project Charter Template

The Project Charter serves as your central repository for business requirements, implementation project steps, and more. It is ideal for auditing purposes. Bring it to...

Stakeholder and Admin Privileged Access Management (PAM) Communication Decks

A significant component to the success of your Privileged Access Management (PAM) implementation is to achieve stakeholder sign-off, and get the support of admins who...

Privileged Access Management (PAM) RFP Template

A Request for Proposal (RFP) is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Privileged Access Management (PAM) Vendor Demo Script

Use this demonstration script to provide Privileged Access Management (PAM) solution vendors with a consistent set of instructions, ensuring an objective comparison of...
GET HELP Contact Us
×
VL Methodology