Security Technology & Operations

IaaS and PaaS Service Level Agreement Template

Use this template to document the specific security requirements of your potential IaaS or PaaS vendor.

Security Policy Prioritization Tool

The Security Policy Prioritization Tool helps your organization prioritize your policy suite based on Importance, Ease to Implement and Ease to Enforce.

Security Assessment Policy – NIST

Use Info-Tech's Security Assessment Policy to specify the requirements of security assessments and their associated controls.

Security Pressure Posture Analysis Tool

Security pressure posture analysis helps your organization assess your real security context and enables your organization to invest in the right security functions while...

Develop and Implement a Security Incident Management Program

Security incidents are inevitable, but how they’re dealt with can make or break an organization. Poor incident response negatively affects business practices, including...
  • guided implementation icon

Privileged Access Management (PAM) Project Charter Template

The Project Charter serves as your central repository for business requirements, implementation project steps, and more. It is ideal for auditing purposes. Bring it to...

Privileged Access Management (PAM) ROI Calculator

The purpose of the Privileged Access Management (PAM) ROI Calculator is to help organizations get an estimation of the tangible benefits of implementing a PAM solution by...

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Security Incident Management Plan

Formalize the security incident management program by defining a central, high-level guide to describe goals, roles, and responsibilities, as well as the process that...

Threat Intelligence Policy Template

The purpose of this policy is to set the requirements for proper facilitation and operation of the threat intelligence program.
GET HELP Contact Us
×
VL Methodology