Security Manual Template
ISO 27000 - Sarbanes Oxley Patriot Act - HIPAA - PCI DSS Complaint
Order Security Manual Download Sample Security Manual
With all of the new legislation, there are more security requirements that need to be met. Requirements like Sarbanes-Oxley, GDPR, CCPA, HIPAA, PCI-DSS, and ITIL, are primary concerns of CIOs as executive management is depending on IT to have the right security policies and procedures in place.
We have just the download you need to create a world class plan and assure you leave no stone unturned. With this Template we walk you through the entire process, providing all the tools you need along the way. As an added benefit you can purchase an update service which keeps these polcies and procedures abreast of the latest legislated and mandated requirements.
This Security Manual for the Internet and Information Technology is over 230 pages in length. All versions of the Security Manual template include both the Business & IT Impact Questionnaire and the Threat & Vulnerability Assessment Tool (both were redesigned to address Sarbanes Oxley compliance). In addition, the Security Manual Template PREMIUM Edition contains 16 detail job descriptions that apply specifically to security and Sarbanes Oxley, ISO 27000, PCI DSS, and HIPAA.
The policies have just been updated and include a section on Log Management which is required to meet the new compliance mandates. The template includes everything needed to customize the Internet and Information Technology Security Manual to fit your specific requirement. The electronic document includes proven written text and examples for the following major topics / sections for your security plan:
- Compliance to ISO 27000, Sarbanes-Oxley, PCI-DSS, Patriot Act and HIPAA
- Security Manual Introduction - scope, objectives, general policy, and responsibilities
- Risk Analysis - objectives, roles, responsibilities, program requirements, and practices program elements
- Staff Member Roles - policies, responsibilities and practices
- Sensitive Information Policy
- Physical Security - area classifications, access controls, and access authority
- Facility Design, Construction and Operational Considerations - requirements for both central and remote access points
- Media and Documentation - requirements and responsibilities
- Data and Software Security - definitions, classification, rights, access control, INTERNET, INTRANET, logging, audit trails, compliance, and violation reporting and follow-up
- Network Security - vulnerabilities, exploitation techniques, resource protection, responsibilities, encryption, and contingency planning
- Internet and Information Technology contingency Planning - responsibilities and documentation requirements
- Travel and Off-Site Meetings - specifics of what to do and not do to maximize security
- Insurance - objectives, responsibilities and requirements
- Outsourced Services - responsibilities for both the enterprise and the service providers
- Waiver Procedures - process to waive security guidelines and policies,
- Incident Reporting Procedures - process to follow when security violations occur
- Access Control Guidelines - responsibilities and how to issue and manage badges / passwords
- Sample Forms
- Business and IT Impact Questionnaire
- Threat & Vulnerability Assessment Tool
- Security Violation Reporting form
- Security Audit form
- Inspection Check List
- New Employee Security form
- Security Access Application form
- Employee Termination Checklist
- Supervisor's Employee Termination Checklist
- Sensitive Information Policy Compliance Agreement
- HIPAA Audit Program Guide
- ISO 27000 (ISO 27002 & ISO 27002) Security Checklist
- PCI DSS Audit Program
The Security Manual template can be purchased with the Disaster Recovery program or by itself in three: Standard, Premium, and Gold.