Security Technology & Operations - Templates & Policies

System Maintenance Policy – NIST

Use Info-Tech's Maintenance Policy to define how system maintenance procedures will operate.

Security Awareness and Training Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

Security Incident Management Runbook: Distributed Denial of Service

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.ni

Internal Controls Self-Assessment Checklist

Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...

Internal Controls Communication Plan Template

Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.

Audit Log Review Policy

The audit log review policy will outline the standards across company systems for the review of audit logs.

SaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential SaaS vendor.

Endpoint Protection Vendor Demo Script

This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...

Vendor Security Process Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to define your vendor due diligence process.

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us