Security Technology & Operations - Templates & Policies

Audit Log Review Policy

The audit log review policy will outline the standards across company systems for the review of audit logs.

Internal Controls Communication Plan Template

Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.

Internal Controls Self-Assessment Checklist

Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.

Vulnerability Scanning Tool RFP Template

Looking for a vulnerability scanning tool? Use this Request for Proposal (RFP) template to get you started.

Data Classification Standard

Use this template to thoroughly outline details of the data classification program, including classification levels, data handling requirements, and disclaimers.

Project Charter and Status Update Template

Use this template to take a lean approach to scoping initiatives during planning stages and tracking its progress during its execution.

IAM Procurement Project Charter Template

Ensure proper project management and stakeholder support from the start of your project by properly planning and scoping your identity and access management solution.

IAM Vendor Demo Script Template

This template is designed to provide IAM vendors with a consistent set of instructions, ensuring an objective comparison of product features – all while evaluating ease...

Security Incident Management Runbook: Distributed Denial of Service

Align the response procedures with Phase 2 of the Develop and Implement a Security Incident Management Program blueprint.ni
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us