The following 328 items are listed by Content Data.
Policies & Procedures
Production Equipment Security Policy
Govern the security of your organization’s production equipment used in an internet-facing environment with the best-pra...
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Policies & Procedures
Instant Messaging Policy
This policy outlines a set of procedures for the proper use of instant messaging by company employees.
Policies & Procedures
Access Management Policy
In this Access Management Policy, we have included four sample documents that can help you ensure that access to all sys...
Policies & Procedures
Infrastructure Policy: Laptops
This policy describes the security precautions that must be taken by all individuals who have a company-issued laptop or...
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...
Guides
Service-Level Agreement Guide
This sample document can be used by organizations as a guide to developing and understanding service-level agreements (S...
Policies & Procedures
Acceptable Use Policy
This tool contains two sample policies that establish standards and procedures organizations should follow for governing...
Guides
Enterprise Risk Assessment Methodology for Internal Audit Plan Development Guide
This guide presents a detailed approach to enterprise risk assessment methodology for internal audit plan development.
Policies & Procedures
Help Desk Infrastructure Policy
This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...