Trial lock

This Research is for Members Only

Not a member? Unlock a free sample of our research now!

Already a member?

Sign in now

Use Info-Tech's Configuration Management Policy to define how configurations will be managed.

Use this tool in conjunction with the project blueprint, Develop and Deploy Security Policies.

Also In

Identify the Best Framework for Your Security Policies

Leverage policies based on NIST, ISO, or other procedural-based documents.

Also In

Develop and Deploy Security Policies

Enhance your overall security posture with a defensible and prescriptive policy suite.

Solution Set Steps

  1. Identify the best framework for your security policies
  2. Develop security policies aligned with the NIST SP 800-171 framework
    • System Configuration Management Policy – NIST
  3. Develop security policies aligned with the ISO 27001 framework
  4. Develop other procedural-based security policies


  • Missing comment
    William Storey | 11-21-2011

    I was looking for a list of policies that reflected what an IT organization should have in its policy library. This is a good start.

  • Missing comment
    Scott Johnston | 02-07-2012

    I need to create a complete set of IT Security Policies to be able to pass audits from financial institutions which usually comply to SAS70 type methodology. Unfortunately, there is not enough framework here to make it usable for me.


Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.