Security - Templates & Policies

Acceptable Usage Policy Template

Acceptable usage policies clearly indicate what information system users are and are not allowed to do. Without these policies, the potential exists that users could...

Web Content Filter Test Checklist

When testing a web content filter in-house, the process must be scripted and stringent to ensure fair scores across every product tested. Use this template to reduce the...

Internet Acceptable Use and Filtering Policy

All enterprises utilizing a web content filter must guide the productive use of Internet services through Internet Acceptable Use and Filtering Policies. Use this...

DRP Test Worksheet

Don't wait until disaster recovery (DR) is invoked to discover weaknesses in DR processes. Run a full test of the enterprise DR plan to uncover flaws before an event...

ESG Business Case and Operations Plan

The Email Security Gateway (ESG) Business Case & Operations Plan acts as a reference guide for information gathered during the Select and Implement an Email Security...

SIEM RFP Template

Use this template to help create a request for proposal (RFP) for a Security Information & Event Management (SIEM) solution according to your enterprise requirements.

Contingency Planning Procedural Policy

Contingency plans are used to establish how information systems will continue to operate in the event of a catastrophic failure of the system or associated components.

Equipment Use Policy

The equipment use policy has been designed to inform employees/end users of best practices and policies to protect company-owned equipment and sensitive data stored on...

System Change Control Procedural Policy

Configuration change control involves the systematic proposal, justification, implementation, test/evaluation, review, and disposition of changes to information systems,...

Systems Monitoring and Auditing Procedural Policy

System monitoring and auditing is used to determine if inappropriate actions have occurred within an information system. System monitoring is used to look for these...
GET HELP Contact Us
×
VL Methodology