Security Technology & Operations - Templates & Policies

Vulnerability Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Incident Report Template

Use this template to create a high-level summary of security incidents.

Vulnerability Management SOP Template

As you are defining or improving your process, be sure to document it. This template provides a starting point in maintaining a detailed standard operating procedure.

Penetration Test RFP Template

Looking to engage a vendor for a Penetration Test? Use this Request for Proposal (RFP) template to get you started.

Security Policy Lifecycle Template

The Security Policy Lifecyle is the “policy of policies” which outlines the various steps in a security policy program and shows the high-level security governance within...

Ransomware Response Runbook Template

Use this example as a starting point to document detailed ransomware response steps, from detection to recovery.

Ransomware Tabletop Planning Results – Example

Leverage tabletop planning to develop an effective and practical response plan that captures the steps staff in your organization would need to execute to prevent and...

Cloud Security Strategy Template

This template, part of the blueprint Build a Cloud Security Strategy, will serve as a repository of information about your approach to securing the cloud.

Cloud Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Coordinated Vulnerability Disclosure Workflow

Use Info-Tech's Coordinated Vulnerability Disclosure Workflow to visualize the response procedures of the program.
Visit our IT’s Moment: A Technology-First Solution for Uncertain Times Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us