Security Policies

Security - How To Implement

The process to implement World Class security is simplified with the
Security Manual Template

Order Security Manual Template Download Sample

Security - How To Implement - The steps to implement a World Class security process are made easy with the Security Manual Template. End users are not security-conscious and do not think about the implications of their on-line activities.

Over 3,000 organizations from over 100 countries have used this template to create their security environment. They have found the process one that is very manageable for companies of all sizes.

Download This Complete and Customizable Security Framework

Each component of this kit comes in editable Microsoft Office templates, is customizable to the specific needs of your business and contains clear instructions and examples. The tools and guides in this package follow the following four steps:

Step 1. Conduct Business Impact Analysis

IT Business ImpactThe business impact analysis is an essential and often overlooked component of a solid IT security plan. This 28 page questionnaire walks you through the documentation process so management can understand the business risks and impact associated with each physical location, business function and IT application.

As you go through this analysis, you will likely discover risk areas that you have not previously considered. Conversely, you are likely to miss critical risk areas if you do not conduct the essential step of methodically documenting all risk areas.

Step 2. Assess Threats and Vulnerabilities

Threat and Vulnerability Assessment
Once you have documented and understand the various business risks, the next step is to conduct an objective evaluation of threats, risks and vulnerabilities in which assumptions and uncertainties are clearly considered and presented to management.

In risk management, you need to have a good understanding of both the level of risk severity and the level of risk probability and how to use that understanding to best measure the overall risk your company faces.

This 10-page Microsoft Word template and companion Excel workbook template will help you put everything into the right perspective so that your top security priorities receive the proper share of attention from management and ensure the “tail does not wag the dog”.

Step 3: Customize Your Security Manual Template

Security PoliciesThis is where the “rubber meets the road” with your security plan. The known risks, threats and vulnerabilities discovered in the previous 2 steps are methodically documented in the template along with clear and specific language defining all aspects of security management including staff member roles, physical security, data storage, network security, contingency planning and more.

The manual also documents the policies and procedures for incident reporting, access control, and various other processes that relate to security.

Step 4: Enforce Security Policies and Procedures

Security Electronic FormsThe Security Manual has recommended policies, procedures and written agreements with employees, vendors and other parties who have access to the company's technology assets. To make this process as easy as possible, Janco provides 18 formatted electronic forms for distribution and documentation. All forms are in easy-to-edit Microsoft Word templates so all you need to do is add your corporate logo, make your own additions and changes and your task of policy and procedure documentation is nearly complete!

The forms included are:

    1. Application & File Server Inventory
    2. Blog Policy Compliance Agreement
    3. BYOD Access and Use Agreement
    4. Company Asset Employee Control Log
    5. Email Employee Agreement
    6. Employee Termination Procedures and Checklist
    7. FIPS 199 Assessment
    8. Internet Access Request Form
    9. Internet and Electronic Communication Employee Agreement
    10. Internet use Approval
    11. Mobile Device Access and Use Agreement
    12. Mobile Device Security and Compliance Checklist
    13. New Employee Security Acknowledgment and Release
    14. Outsourcing and Cloud Security Compliance Agreement
    15. Outsourcing Security Compliance Agreement
    16. Preliminary Security Audit Checklist
    17. Privacy Compliance Policy Acceptance Agreement
    18. Risk Assessment (pdf & docx)
    19. Security Access Application
    20. Security Audit Report
    21. Security Violation Procedures
    22. Sensitive Information Policy Compliance Agreement
    23. Server Registration
    24. Social networking Policy Compliance Agreement
    25. Telecommuting Work Agreement
    26. Text Messaging Sensitive Information Agreement
    27. Threat and Vulnerability Assessment Inventory
    28. Work From Home Work Agreement
    29. Plus more

Order Security Manual Template Download Sample