Security Manual Template - Policies and Procedures
Security Policies and Procedures Manual Template

Security Manual Template

ISO 27000 - Sarbanes Oxley Patriot Act - HIPAA - PCI DSS Complaint

Order

Download

With all of the new legislation, there are more security requirements that need to be met.  Requirements like Sarbanes-Oxley, HIPAA, PCI-DSS, and ITIL, are primary concerns of CIOs as executive management is depending on IT to have the right security policies and procedures in place.

We have just the download you need to create a world class plan and assure you leave no stone unturned. With this Template we walk you through the entire process, providing all the tools you need along the way.  As an added benefit you can purchase an update service which keeps these polcies and procedures abreast of the latest legislated and mandated requirements. 

This Security Manual for the Internet and Information Technology is over 230 pages in length. All versions of the Security Manual template include both the Business & IT Impact Questionnaire and the Threat & Vulnerability Assessment Tool (both were redesigned to address Sarbanes Oxley compliance).   In addition, the Security Manual Template PREMIUM Edition  contains 16 detail job descriptions that apply specifically to security and Sarbanes Oxley, ISO 27000, PCI DSS, and HIPAA.

The policies have just been updated and include a section on Log Management which is required to meet the new compliance mandates.

The Security Manual template can be purchased with the Disaster Recovery program or by itself in three: Standard, Premium, and Gold.

Security PoliciesStandard Edition Security Manual Template

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerability Assessment Form PDF and MS Excel Format
  • HIPAA Audit Program MS Word Format
  • Sarbanes Oxley Section 404 Checklist MS Word Format
  • Security Audit Program - fully editable
    • Comes in MS EXCEL and PDF formats
    • Meets ISO 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
    • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including:

    • Blog Policy Compliance
    • Company Asset Employee Control Log
    • Email - Employee Acknowledgment
    • Employee Termination Checklist
    • Internet Access Request
    • Internet Use Approval
    • Internet & Electronic Communication - Employee Acknowledgment
    • Mobile Device Access and Use Agreement
    • Employee Security Acknowledgement Release
    • Preliminary Security Audit Checklist
    • Security Access Application
    • Security Audit Report
    • Security Violation Reporting
    • Sensitive Information Policy Compliance Agreement

Security PoliciesPremium Edition Security Manual Template

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerability Assessment Form PDF and MS Excel Format
  • HIPAA Audit Program MS Word Format
  • Sarbanes Oxley Section 404 Checklist MS Word Format
  • Security Audit Program - fully editable
    • Comes in MS EXCEL and PDF formats
    • Meets ISO 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
    • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
    Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including:

    • Blog Policy Compliance
    • Company Asset Employee Control Log
    • Email - Employee Acknowledgment
    • Employee Termination Checklist
    • Internet Access Request
    • Internet Use Approval
    • Internet & Electronic Communication - Employee Acknowledgment
    • Mobile Device Access and Use Agreement
    • Employee Security Acknowledgement Release
    • Preliminary Security Audit Checklist
    • Security Access Application
    • Security Audit Report
    • Security Violation Reporting
    • Sensitive Information Policy Compliance Agreement
  • Security Job Descriptions MS Word Format
    • Chief Security Officer (CSO)
    • Chief Compliance Officer (CCO)
    • VP Strategy and Architecture
    • Director e-Commerce
    • Database Administrator
    • Data Security Administrator
    • Manager Data Security
    • Manager Facilities and Equipment
    • Manager Network and Computing Services
    • Manager Network Services
    • Manager Training and Documentation
    • Manager Voice and Data Communication
    • Manager Wireless Systems
    • Network Security Analyst
    • System Administrator - Unix
    • System Administrator - Windows

Security PoliciesGold Edition Security Manual Template

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerability Assessment Form PDF and MS Excel Format
  • HIPAA Audit Program MS Word Format
  • Sarbanes Oxley Section 404 Checklist MS Word Format
  • Security Audit Program - fully editable
    • Comes in MS EXCEL and PDF formats
    • Meets ISO 27001, 27002, Sarbanes-Oxley, PCI-DSS and HIPAA requirements
    • Over 400 unique tasks divided into 11 areas of audit focus which are the divided into 38 separate task groupings
  • Electronic forms that can be Emailed, completed via a computer or tablet, and stored electronically including:

    • Blog Policy Compliance
    • Company Asset Employee Control Log
    • Email - Employee Acknowledgment
    • Employee Termination Checklist
    • Internet Access Request
    • Internet Use Approval
    • Internet & Electronic Communication - Employee Acknowledgment
    • Mobile Device Access and Use Agreement
    • Employee Security Acknowledgement Release
    • Preliminary Security Audit Checklist
    • Security Access Application
    • Security Audit Report
    • Security Violation Reporting
    • Sensitive Information Policy Compliance Agreement
  • 281 job descriptions from the Internet and IT Job Descriptions HandiGuide in MS Word Format including all of the job descriptions in the Premium Edition.

Order Security ManualDownload Sample

Security Manaual Policies and Procedures Topics

  • Account privileges
  • Antivirus
  • Asset disposal
  • Backup end user
  • Backup server
  • Blackberry usage 
  • Blog
  • Business Continuity
  • Cellular phone
  • Change control
  • Change management
  • Copyright
  • Disaster Recovery
  • Document retention
  • Downtime
  • Email acceptable use
  • Email archiving
  • Email communications
  • Equipment loan
  • Firewall
  • GPS cell phone
  • Hardware sanitization
  • Helpdesk triage
  • Instant messenger
  • Internet usage
  • Move-add-change
  • Outsourcing
  • Password
  • Patch management
  • PDA usage
  • Personal network
  • Printer
  • Purchasing
  • Remote Access
  • Server space usage
  • Software acceptance
  • Software development
  • Software install
  • Support Technology
  • Standards
  • Telecommuting
  • Third party access
  • Travel
  • Voicemail
  • Web posting

Clients can also subscribe to Janco's Security Manual update service and receive all updates to the Security Manual Template. 

The template includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement.  The electronic document includes proven written text and examples for the following major topics / sections for your security plan:

  • Compliance to ISO 27000, Sarbanes-Oxley, PCI-DSS, Patriot Act and HIPAA
  • Security Manual Introduction - scope, objectives, general policy, and responsibilities
  • Risk Analysis - objectives, roles, responsibilities, program requirements, and practices program elements
  • Staff Member Roles - policies, responsibilities and practices
  • Sensitive Information Policy
  • Physical Security  - area classifications, access controls, and access authority
  • Facility Design, Construction and Operational Considerations - requirements for both central and remote access points
  • Media and Documentation - requirements and responsibilities
  • Data and Software Security - definitions, classification, rights, access control, INTERNET, INTRANET, logging, audit trails, compliance, and violation reporting and follow-up
  • Network Security - vulnerabilities, exploitation techniques, resource protection, responsibilities, encryption, and contingency planning
  • Internet and Information Technology contingency Planning - responsibilities and documentation requirements
  • Travel and Off-Site Meetings - specifics of what to do and not do to maximize security
  • Insurance - objectives, responsibilities and requirements
  • Outsourced Services - responsibilities for both the enterprise and the service providers
  • Waiver Procedures - process to waive security guidelines and policies,
  • Incident Reporting Procedures - process to follow when security violations occur
  • Access Control Guidelines - responsibilities and how to issue and manage badges / passwords
  • Sample Forms
    • Business and IT Impact Questionnaire
    • Threat & Vulnerability Assessment Tool
    • Security Violation Reporting form
    • Security Audit form
    • Inspection Check List
    • New Employee Security form
    • Security Access Application form
    • Employee Termination Checklist
    • Supervisor's Employee Termination Checklist
    • Sensitive Information Policy Compliance Agreement
    • HIPAA Audit Program Guide
    • ISO 27000 (ISO 27002 & ISO 27002) Security Checklist
    • PCI DSS Audit Program

Order Security ManualDownload Sample