91Ƭ

Security Technology & Operations - Templates & Policies

Vulnerability Management Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

IAM Improvement Strategy Communication Deck

Use this tool to capture the essential elements of your IAM improvement strategy.

Employee Access Change Process

Use this template to document the current- or target-state IAM processes related to managing access when employees change roles.

Employee Offboarding Process

Use this template to document the current- or target-state IAM processes related to offboarding leaving employees.

Employee Onboarding Process

Use this template to document the current- or target-state IAM processes related to onboarding new employees.

One-Page Emergency Incident Response Plan

Use this tool to develop an emergency incident response plan on a single page.

Ransomware Payment Policy Template

Use this template to create a ransomware payment policy BEFORE you're faced with a difficult decision. This policy will guides your decision based on criteria you've...

Autonomous Security Delivery Roadmap Template

Use this deck as the starting point to present your completed list of prioritized and sequenced initiatives that have been vetted through a series of activities to discern...

Authentication Standard Template

A standard template that will assist with the execution of your authentication policies.

Authentication Strategy Communication Deck

A communication template that will help you present your authentication roadmap and strategy to your executives. 
Visit our IT Critical Response Resource Center
Over 100 analysts waiting to take your call right now: +1 (703) 340 1171
GET HELP
Contact Us