Information Security Policy and Procedures Manual - Standard Edition

The "Information Security Policy and Procedures Manual (Standard Edition)", available for instant download, includes over 100 pages of professionally researched, industry leading information security policies, procedures, forms, checklists, templates, provisioning and hardening documents, and much more.

From essential network security policies to in-depth and detailed technical hardening documents, the Information Security Policy and Procedures Manual from is a must have for any organization serious about ensuring the confidentiality, integrity, and availability (CIA) of critical system resources. View the Table of Contents now. Developed by leading cyber security specialists and regulatory compliance specialists, the manual comes complete with the following documentation:

Additional Information:

Length:í«í_103 Pages.

File Format:í«í_Microsoft Word

Notable Topics Covered:

  • Network Guidelines, Responsibilities and Acceptable Use
  • Social Media Guidelines, Responsibilities and Acceptable Use
  • Identity Theft
  • Securing Your Home Network
  • Online Security and Mobile Computing
  • Online Shopping
  • Other Important Security Considerations
  • Helpful Security Resources
  • Security Updates
  • Workstation Security
  • Laptop Security
  • Software Licensing and Usage
  • Internal Threats
  • Clean Desk Policy
  • Data Security Breaches
  • Data and Information Classification
  • Security Categorization
  • Asset Inventory
  • Personally Identifiable Information (PII)
  • Protected Health Information (PHI)
  • Personally Identifiable Financial Information (PIFI)
  • Physical Security and Environmental Security
  • Personnel
  • Security Awareness Training
  • Provisioning and Hardening
  • Reference Material
  • Time Synchronization
  • Access Rights
  • Methods of Authentication
  • Password Parameters
  • De-Provisioning | Off-boarding Process
  • Remote Access
  • Wireless Security
  • Malware
  • Change Control | Change Management
  • Software Development Life Cycle (SDLC)
  • Patch Management
  • Vulnerability Management
  • Configuration Management
  • Vendor Management
  • Backup and Storage
  • Encryption
  • Event Monitoring
  • Configuration and Change Monitoring
  • Performance and Utilization Monitoring
  • Logging and Reporting
  • Data Retention and Disposal
  • Incident Response
  • Performance and Security Testing
  • Disaster Recovery
  • Authorization Form for User Access | New Employees
  • Authorization Form for User Access | Vendors
  • Authorization Form for User Access | Guests
  • User De-provisioning | Off-boarding Form | All Users (Employee, Guest, Vendor, Other)
  • Employee Separation Form
  • Change Management Request Form (CMRF)
  • Change Management Logging System (CMLS)
  • Remote Access Request Form
  • Incident Response Plan Form
  • Security Awareness Training Instructional Guide
  • Wireless Security Checklist
  • and more!

Related Items