Security - Templates & Policies
Topics
-
CIO391
-
Infrastructure & Operations363
-
Enterprise Architecture176
-
Applications245
-
Project & Portfolio Management152
-
Data & Business Intelligence149
-
Security192
-
Vendor Management75
-
Templates & Policies115
-
-
Application Development12
-
Budgeting/Procurement10
-
Collaboration1
-
Communications3
-
Data & Digital Assets12
-
Department Governance24
-
Desktop Systems4
-
Disaster & Continuity10
-
Email & Messaging4
-
End-User Support4
-
Enterprise Applications10
-
Hardware13
-
HR Management9
-
Mobile & Wireless7
-
Network Management4
-
Operating Systems1
-
Operations11
-
Project Management16
-
Security19
-
Small Business Essentials9
-
Small Business Extras2
-
Storage5
-
Web Site Development4
-
Types of Content
Web Content Filter Test ChecklistWhen testing a web content filter in-house, the process must be scripted and stringent to ensure fair scores across every product tested. Use this template to reduce the... |
|
DRP Test WorksheetDon't wait until disaster recovery (DR) is invoked to discover weaknesses in DR processes. Run a full test of the enterprise DR plan to uncover flaws before an event... |
|
GPS Cell Phone PolicyThe GPS Cell Phone policy allows employees to do their jobs effectively. This policy supports the guidelines for appropriate use and other administrative issues relating... |
|
Removable Media Acceptable Use PolicyThe removable media acceptable use policy defines the standards, procedures, and restrictions for end users who have legitimate business requirements to connect portable... |
|
Server Configuration PolicyThe server configuration policy establishes the standards, procedures, and restrictions for new servers being installed within the company. |
|
Equipment Use PolicyThe equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on... |
|
Instant Messaging Usage and Security PolicyThe instant messaging usage and security policy outlines the standards for the usage of, and security controls associated with, corporate instant messaging. |
|
Physical Access PolicyPhysical access controls define who is allowed physical access to facilities that house information systems, and to the information systems within those facilities and/or... |
|
Secure Acquisitions PolicyThe secure acquisitions policy outlines standards for wise acquisitions of information systems in terms of IT security. |
|
Anti-Virus PolicyThe anti-virus policy provides a computing network that is virus-free; this policy provides instructions on measures that must be taken by company employees to help... |
|