The following 22 items are listed by Content Data.
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Policies & Procedures
Data Center Security Policy
This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Policies & Procedures
Physical and Environmental Security Policy
This sample policy is designed to help organizations prevent unauthorized access, damage and interference to business pr...
Subscriber Content
Memos
Security Access Badges Memo
This sample memo serves as a report of an internal audit function’s high-level assessment of the security access badges ...
Subscriber Content
Policies & Procedures
Physical Security Standard Policy
The purpose of this policy is to create and maintain a physically secure environment that protects company property and ...
Subscriber Content
Policies & Procedures
Facility Access Controls Policy
This sample policy provides an overview of procedures organizations should perform during the facility access controls p...
Subscriber Content
Audit Reports
ISO 27001 Information Security Assessment Report
This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Checklists & Questionnaires
Hazard Assessment Checklist and Corrective Action Report
This tool provides questions to consider while conducting periodic hazard assessments.
Subscriber Content
Policies & Procedures
Sensitive Data Handling Policy
The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content
Audit Programs
Security Policy Review Audit Work Program
The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content