Use Info-Tech's Configuration Management Policy to define how configurations will be managed.

Use this tool in conjunction with the project blueprint, Develop and Deploy Security Policies.

Also In

Develop and Deploy Security Policies

Enhance your overall security posture with a defensible and prescriptive policy suite.

Related Content

2 Comments

  • Missing comment
    William Storey | 11-21-2011

    I was looking for a list of policies that reflected what an IT organization should have in its policy library. This is a good start.

  • Missing comment
    Scott Johnston | 02-07-2012

    I need to create a complete set of IT Security Policies to be able to pass audits from financial institutions which usually comply to SAS70 type methodology. Unfortunately, there is not enough framework here to make it usable for me.

Social

Get Access

Get Instant Access
To unlock the full content, please fill out our simple form and receive instant access.