Security Technology & Operations - Templates & Policies

Vendor Security Process Template

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to define your vendor due diligence process.

Vendor Security Process Diagram

Use this template as part of the blueprint, Build a Vendor Security Assessment Service, to create a visual representation of your vendor due diligence process.

Cloud Security Communication Deck

Use this template to outline the organization’s security understanding and requirements of the proposed cloud migration.

Mobile Device Remote Wipe Waiver Template

Having the ability to remote wipe is one of the most basic tools in IT's arsenal for securing mobile devices. Use this remote wipe waiver template to create a document...

IaaS and PaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.

Threat Intelligence Malware Runbook Template

Threats can be categorized into runbooks for which a standardized response process can be defined, eliminating inconsistency and ambiguity while increasing operational...

Threat Intelligence Alert and Briefing Cadence Schedule Template

Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary threat intelligence stakeholders.

Network and Communications Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us