- Acceptable Use Policy - Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information. [MS Word]
- Acquisition Assessment Policy - Defines responsibilities regarding corporate acquisitions and the minimum requirements of an acquisition assessment to be completed by the information security group. [MS Word]
- Analog/ISDN Line Policy - Defines policy for analog/ISDN lines used for FAXing and data connections.
- Anti-Virus Policy - Requirements for effective virus detection and prevention. Written for a laboratory environment but easy to adapt for other settings. [MS Word]
- Application Service Provider Policy - Security criteria for an ASP.
- Audit Policy - Defines requirements and provides authority for the information security team to conduct IT audits and risk assessments.
- Certification and Accreditation Policy - Policy template by Walt Kobus defines requirements and responsibilities for security assurance throughout the system development process. [PDF]
- Communications Policy - Datacommunications security policy template by Walt Kobus defines network security control requirements. [PDF]
- Company Email Policy - A menu of clauses suitable for email acceptable use policies.
- Cryptography Policy - Cryptographic policy template by Walt Kobus. [PDF]
- Data Classification Policy - Policy template by Walt Kobus describes the classification of information according to sensitivity (primarily confidentiality). [PDF]
- Database Password Policy - Defines requirements for securely storing and retrieving database usernames and passwords. [MS Word]
- Dial-in Access Policy - Policy regarding the use of dial-in connections to corporate networks. [MS Word]
- DMZ Security Policy - Sample policy establishing security requirements of equipment to be deployed in the corporate De-Militarized Zone. [MS Word]
- Email Forwarding Policy - Email must not be forwarded automatically to an external destination without prior approval from the appropriate manager.
- Email Retention Policy - Sample policy to help employees determine which emails should be retained and for how long.
- Encryption Policy - Defines encryption algorithms that are suitable for use within the organization. [MS Word]
- Ethics Policy - Sample policy intended to 'establish a culture of openness, trust and integrity'.
- Extranet Policy - Defines the requirement that third party organizations requiring access to the organization's networks must sign a third-party connection agreement. [MS Word]
- Government Security Policy - The New Zealand Government's information security policy, based on the 2000 version of ISO/IEC 17799. [ZIP file containing PDF and MS Word versions]
- HSPD-12 Privacy Policy - Sample privacy policy including Privacy Act systems of records notices, Privacy Act statements and a privacy impact assessment, designed to satisfy the requirements of HSPD-12 “Policy for a Common Identification Standard for Federal Employees and Contractors”
- Identification and Authentication Policy - I&A policy template by Walt Kobus defines requirements for access control. [PDF]
- Information Data Ownership Policy - Policy template by Walt Kobus defines the roles and responsibilities of owners, custodians and users of information systems. [PDF]
- Information Security Policies - Templates for information security policies, guidelines, checklists and procedures by Walt Kobus.
- Information Security Policies - Collection of information security policy samples covering PKI, antivirus, ethics, email and several other topics, from AttackPrevention.
- Information Security Policies - NIST's extensive collection of well over 100 security policies and related awareness materials, mostly from US Government bodies.
- Information Security Policies - Electronic resource usage and security policies from the University of Pennsylvania.
- Information Security Policies - US Postal Service's information security policy manual. 264 pages of security controls, broadly similar in structure to ISO/IEC 27002. [PDF]
- Information Security Policies - Policies on information security and other topics from ePolicy Institute.
- Information Security Policies - The Information Security Toolkit from UCISA (University Colleges and Information Systems Association) contains a suite of security policy and guidance documents reflecting and cross-referenced against BS7799. [PDF documents]
- Information Security Policies - 111-page security policy manual from the Australian New South Wales Department of Commerce, based on ISO/IEC 27001. [PDF]
- Information Security Policies - Set of acceptable use and technical policies from the University of Auckland covering common information security issues.
- Information Security Policies - SANS consensus research project offering around 30 editable information security policies.
- Information Security Policy - An information security policy from the University of Illinois.
- Information Sensitivity Policy - Sample policy defining the assignment of sensitivity levels to information.
- Internet Acceptable Use Policy - One page Acceptable Use Policy example. [PDF]
- Internet DMZ Equipment Policy - Sample policy defining the minimum requirement for all equipment located outside the corporate firewall.
- IP Network Security Policy - Example security policy to demonstrate policy writing techniques introduced in three earlier articles.
- ISO 27001 Policies - Typical headings for a security policy aligned broadly with the ISO/IEC standard for information security management systems.
- IT Security Policy - Information technology security policy at Murdoch University, complete wth supporting standards and guidelines.
- IT Security Policy - IT security policy example/how-to guide from Enterprise Ireland.
- K-20 Network Acceptable Use Policy - Policy on acceptable use of a school network, along with information for parents and an informed consent form. Developed in Washington State.
- Laboratory Security Policy - Policy to secure confidential information and technologies in the labs and protect production services and the rest of the organization from lab activities. [MS Word]
- Modem Policy - Sample policy from Sandstorm, designed as an addition to an existing Remote Access Policy, if one exists, or simply to stand alone.
- Network Security Policy - Example security policy for a data network from the University of Toronto.
- Network Security Policy Guide - Watchguard's guide to creating an overarching network information security policy, supported by subsidiary policies. [PDF]
- Password Policy - A password policy presented in the form of a security awareness poster. "Passwords are like underwear ..." [PDF]
- Password Policy - Defines standards for creating, protecting and changing strong passwords. [MS Word]
- Personnel Security Policy - Example policy covering pre-employment screening, security policy training etc. [PDF]
- Physical Security Policy - Policy template by Walt Kobus defines requirements for physical access control to sensitive facilities and use of ID badges. [PDF]
- Privacy Policy - Generic policy for websites offering goods and services, with an important warning to seek qualified legal advice in this area.
- Remote Access Policy - Defines standards for connecting to a corporate network from any host. [MS Word]
- Resource Utilization Policy - Poilicy template by Walt Kobus defines requirements for resilience, redundancy and fault tolerance in information systems. [PDF]
- Risk Assessment Policy - Defines requirements and authorizes the information security team to identify, assess and remediate risks to the organization's information infrastructure. [MS Word]
- Router Security Policy - Sample policy establishing the minimum security requirements for all routers and switches connecting to production networks. [MS Word]
- Security Audit Policy - Audit policy template by Walt Kobus. [PDF]
- Security Management Policy - General information security policy template by Walt Kobus. [PDF]
- Security Policy Primer - General advice for those new to writing information security policies. [PDF]
- Server Security Policy - Defines standards for minimal security configuration for servers inside the organization's production network, or used in a production capacity.
- Telecommuting/Teleworking Policy - Sample policy on teleworking covering employment as well as information security issues.
- Third Party Connection Agreement - Sample agreement for establishing a connection to an external party.
- Use of Electronic Mail - Policy from the University of Colorado on the use of, access to, and disclosure of electronic mail.
- User Data Protection Policy - Policy template by Walt Kobus defines requirements for access controls, least privilege, integrity etc. to secure personal data. [PDF]
- Virtual Private Network Policy - Defines the requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization's network.
- Wireless Communication Policy - Sample policy concerning the use of unsecured wireless communications technology.
Monday, October 15, 2007
Sample Security Policies
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment