Security Technology & Operations - Templates & Policies

Personnel Security Policy – NIST

Use Info-Tech's Personnel Security Policy to document the personnel requirements prior to and during employment.

Physical Protection Policy – NIST

Use Info-Tech's Physical Security Policy to outline the measures taken to protect physical security.

Audit and Accountability Policy – NIST

​Use Info-Tech's Audit and Accountability Policy to specify the parameters for system monitoring, analysis and investigation of system activity.

Endpoint Protection Request for Proposal

A request for proposal is a formal invitation issued by a business or agency requesting interested vendors to submit written proposals meeting a particular set of...

Endpoint Protection Vendor Demo Script

This template is designed to provide EPP vendors with a consistent set of instructions, ensuring an objective comparison of product features, all while evaluating ease of...

Endpoint Protection Metrics Summary Template

Identify relevant metrics to assist in evaluating the success of your organization's endpoint protection process.

Threat Intelligence Alert and Briefing Cadence Schedule Template

Formalize a monthly cadence schedule to actively collaborate both internally and externally with the necessary threat intelligence stakeholders.

Threat Intelligence Project Charter Template

Management buy-in is key to establishing an effective threat intelligence program. The approval indicates that security is top-of-mind and that the process aligns with...

Threat Intelligence Management Plan Template

A management plan organizes the project so that you can make efficient and effective resource allocation decisions.

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.
Visit our COVID-19 Resource Center and our Cost Management Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us