Security Processes & Operations - Templates & Policies

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Server Configuration Policy

The server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company.

Systems Monitoring and Auditing Procedural Policy

System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...

Data Protection Procedural Policy

The data protection policy will outline the standards for protecting corporate data from any risk that it may be exposed to.

Document Retention Policy

The document retention policy ensures that copies of certain documents for legal, regulatory, and/or operations reasons are made, committing companies to good business...

Server Backup Policy

The server backup policy protects data from loss or destruction in IT departments within companies. Without a server backup policy, a company’s assets are not as safe as...

Contingency Planning Procedural Policy

Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.

Security Component Maturity Level Descriptions

This document provides different maturity level descriptions for each security component that makes up the Info-Tech Information Security Framework.

Information Security Strategy Workbook Template

Clearly identifying and documenting your information security obligations, scope, goals and other pertinent information are essential parts of building and implementing a...

Security Metrics Summary Document

Use this template as the one document where your metrics and their definitions live, and update it as needed.
GET HELP Contact Us
×
VL Methodology