Security Processes & Operations - Templates & Policies

Asset Management Policy – ISO

The purpose of the asset management policy is to ensure assets are identified appropriately and the proper protection controls for those assets are in place.

Data Protection Procedural Policy

The data protection policy will outline the standards for protecting corporate data from any risk that it may be exposed to.

Document Retention Policy

The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...

Contingency Planning Procedural Policy

Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.

Security Metrics Executive Communications Presentation

Communication is a significant contributor to the success of your metrics program. Make sure you're sharing the metrics that truly matter to business stakeholders.

Internal Controls Communication Plan Template

Internal controls are only as effective as their level of adoption. Use this template to ensure that users are aware and compliant with internal controls.

Internal Controls Monitoring RACI Template

Responsibilities for governance of the internal controls system should be integrated into the risk management and overall governance function of the IT organization. Use...

Internal Controls Self-Assessment Checklist

Self-assessments of the system of internal control should be aligned with the risk assessment process and completed at least annually or upon any major change to the...

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.
GET HELP Contact Us
×
VL Methodology