91Ƭ

Security - Templates & Policies

Coordinated Vulnerability Disclosure Policy

Use Info-Tech's Coordinated Vulnerability Disclosure Policy to specify the parameters of your program.

Coordinated Vulnerability Disclosure Plan

Use Info-Tech's Coordinated Vulnerability Disclosure Plan to detail the response procedures of the program.

Coordinated Vulnerability Disclosure Workflow

Use Info-Tech's Coordinated Vulnerability Disclosure Workflow to visualize the response procedures of the program.

Data Protection Policy

Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.

Policy Exception Tracker

Use this tool to help you track ongoing exceptions to your security policies.

Information Security Policy Exception Request Form

Use this template as a means to request and approve proposed exceptions to your security policies.

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

Security Operations Policy

The purpose of this policy is to set the requirements for proper facilitation and operation of the security operations program.

Security Operations Project Charter Template

Management buy-in is key to establishing an effective next-generation security operations program. The approval indicates that security is top-of-mind and that the process...
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us