Web Directory

  Sample Policies (67)

Submit a Featured Link: [$19.00] Submit a Regular Link: [$9.00]  

See Also - Related Categories
Regular Websites in this category

Disaster Recovery Policy Open in a new windowLink Details
- Succinct DR policy from Imperial College, London.
- http://www3.imperial.ac.uk/secretariat/policiesandpublications/disasterrecovery/policy/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Information Sensitivity Policy Open in a new windowLink Details
- Sample policy defining the assignment of sensitivity levels to information.
- http://www.sans.org/resources/policies/Information_Sensitivity_Policy.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Internet DMZ Equipment Policy Open in a new windowLink Details
- Sample policy defining the minimum requirement for all equipment located outside the corporate firewall.
- http://www.sans.org/resources/policies/Internet_DMZ_Equipment_Policy.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Server Security Policy Open in a new windowLink Details
- Defines standards for minimal security configuration for servers inside the organization's production network, or used in a production capacity.
- http://www.sans.org/resources/policies/Server_Security_Policy.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Third Party Connection Agreement Open in a new windowLink Details
- Sample agreement for establishing a connection to an external party.
- http://www.sans.org/resources/policies/Third_Party_Agreement.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Virtual Private Network Policy Open in a new windowLink Details
- Defines the requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization's network.
- http://www.sans.org/resources/policies/Virtual_Private_Network.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Wireless Communication Policy Open in a new windowLink Details
- Sample policy concerning the use of unsecured wireless communications technology.
- http://www.sans.org/resources/policies/Wireless_Communication_Policy.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Application Service Provider Policy Open in a new windowLink Details
- Security criteria for an ASP.
- http://www.sans.org/resources/policies/Application_Service_Providers.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Email Forwarding Policy Open in a new windowLink Details
- Email must not be forwarded automatically to an external destination without prior approval from the appropriate manager.
- http://www.sans.org/resources/policies/Automatically_Forwarded_Email_Policy.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Audit Policy Open in a new windowLink Details
- Defines requirements and provides authority for the information security team to conduct IT audits and risk assessments.
- http://www.sans.org/resources/policies/Audit_Policy.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Information Security Policies Open in a new windowLink Details
- The Information Security Toolkit from UCISA (University Colleges and Information Systems Association) contains a suite of security policy and guidance documents reflecting and cross-referenced against BS7799. [PDF documents]
- http://www.ucisa.ac.uk/ist/agree/

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Government Security Policy Open in a new windowLink Details
- The New Zealand Government's information security policy, based on the 2000 version of ISO/IEC 17799. [ZIP file containing PDF and MS Word versions]
- http://www.security.govt.nz/sigs/sigs.zip

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Password Policy Open in a new windowLink Details
- Defines standards for creating, protecting and changing strong passwords. [MS Word]
- http://www.sans.org/resources/policies/Password_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Privacy Policy Open in a new windowLink Details
- Generic policy for websites offering goods and services, with an important warning to seek qualified legal advice in this area.
- http://www.cbe.uidaho.edu/wegman/404/PRIVACY%20POLICY%20IVI%20Generic.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
DMZ Security Policy Open in a new windowLink Details
- Sample policy establishing security requirements of equipment to be deployed in the corporate De-Militarized Zone. [MS Word]
- http://www.sans.org/resources/policies/DMZ_Lab_Security_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Dial-in Access Policy Open in a new windowLink Details
- Policy regarding the use of dial-in connections to corporate networks. [MS Word]
- http://www.sans.org/resources/policies/Dial-in_Access_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Router Security Policy Open in a new windowLink Details
- Sample policy establishing the minimum security requirements for all routers and switches connecting to production networks. [MS Word]
- http://www.sans.org/resources/policies/Router_Security_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Remote Access Policy Open in a new windowLink Details
- Defines standards for connecting to a corporate network from any host. [MS Word]
- http://www.sans.org/resources/policies/Remote_Access_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Risk Assessment Policy Open in a new windowLink Details
- Defines requirements and authorizes the information security team to identify, assess and remediate risks to the organization's information infrastructure. [MS Word]
- http://www.sans.org/resources/policies/Risk_Assessment_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Database Password Policy Open in a new windowLink Details
- Defines requirements for securely storing and retrieving database usernames and passwords. [MS Word]
- http://www.sans.org/resources/policies/DB_Credentials_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Internet Acceptable Use Policy Open in a new windowLink Details
- One page Acceptable Use Policy example.
- http://www.ruskwig.com/docs/internet_policy.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Personnel Security Policy Open in a new windowLink Details
- Example policy covering pre-employment screening, security policy training etc.
- http://www.datasecuritypolicies.com/wp-content/uploads/2007/04/generic-personnel-security-policy.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Network Security Policy Open in a new windowLink Details
- Example security policy for a data network from the University of Toronto.
- http://www.utoronto.ca/security/documentation/policies/policy_5.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Physical Security Policy Open in a new windowLink Details
- Policy template by Walt Kobus defines requirements for physical access control to sensitive facilities and use of ID badges.
- http://www.tess-llc.com/Physical%20Security%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Data Classification Policy Open in a new windowLink Details
- Policy template by Walt Kobus describes the classification of information according to sensitivity (primarily confidentiality).
- http://www.tess-llc.com/Data%20Classification%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Resource Utilization Policy Open in a new windowLink Details
- Poilicy template by Walt Kobus defines requirements for resilience, redundancy and fault tolerance in information systems.
- http://www.tess-llc.com/Resource%20Utilization%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Information Data Ownership Policy Open in a new windowLink Details
- Policy template by Walt Kobus defines the roles and responsibilities of owners, custodians and users of information systems.
- http://www.tess-llc.com/Information%20Data-Ownership%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
User Data Protection Policy Open in a new windowLink Details
- Policy template by Walt Kobus defines requirements for access controls, least privilege, integrity etc. to secure personal data.
- http://www.tess-llc.com/User%20Data%20Protection%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Identification and Authentication Policy Open in a new windowLink Details
- I&A policy template by Walt Kobus defines requirements for access control.
- http://www.tess-llc.com/Identification%20&%20Authentication%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Certification and Accreditation Policy Open in a new windowLink Details
- Policy template by Walt Kobus defines requirements and responsibilities for security assurance throughout the system development process.
- http://www.tess-llc.com/Certification%20&%20Accreditation%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Communications Policy Open in a new windowLink Details
- Datacommunications security policy template by Walt Kobus defines network security control requirements.
- http://www.tess-llc.com/Communications%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Cryptography Policy Open in a new windowLink Details
- Cryptographic policy template by Walt Kobus.
- http://www.tess-llc.com/Cryptography%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Security Audit Policy Open in a new windowLink Details
- Audit policy template by Walt Kobus.
- http://www.tess-llc.com/Security%20Audit%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Security Management Policy Open in a new windowLink Details
- General information security policy template by Walt Kobus.
- http://www.tess-llc.com/Security%20Mngt%20PolicyV4.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Extranet Policy Open in a new windowLink Details
- Defines the requirement that third party organizations requiring access to the organization's networks must sign a third-party connection agreement. [MS Word]
- http://www.sans.org/resources/policies/Extranet_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Ethics Policy Open in a new windowLink Details
- Sample policy intended to 'establish a culture of openness, trust and integrity'.
- http://www.sans.org/resources/policies/Ethics_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Email Retention Policy Open in a new windowLink Details
- Sample policy to help employees determine which emails should be retained and for how long.
- http://www.sans.org/resources/policies/email_retention.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Laboratory Security Policy Open in a new windowLink Details
- Policy to secure confidential information and technologies in the labs and protect production services and the rest of the organization from lab activities. [MS Word]
- http://www.sans.org/resources/policies/Internal_Lab_Security_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Acquisition Assessment Policy Open in a new windowLink Details
- Defines responsibilities regarding corporate acquisitions and the minimum requirements of an acquisition assessment to be completed by the information security group. [MS Word]
- http://www.sans.org/resources/policies/Aquisition_Assessment_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Anti-Virus Policy Open in a new windowLink Details
- Requirements for effective virus detection and prevention. Written for a laboratory environment but easy to adapt for other settings. [MS Word]
- http://www.sans.org/resources/policies/Lab_Anti-Virus_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Analog/ISDN Line Policy Open in a new windowLink Details
- Defines policy for analog/ISDN lines used for FAXing and data connections.
- http://www.sans.org/resources/policies/Analog_Line_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Acceptable Use Policy Open in a new windowLink Details
- Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information. [MS Word]
- http://www.sans.org/resources/policies/Acceptable_Use_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Encryption Policy Open in a new windowLink Details
- Defines encryption algorithms that are suitable for use within the organization. [MS Word]
- http://www.sans.org/resources/policies/Acceptable_Encryption_Policy.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Security Policy Primer Open in a new windowLink Details
- General advice for those new to writing information security policies.
- http://www.sans.org/resources/policies/Policy_Primer.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
IT Security Policy Open in a new windowLink Details
- IT security policy example/how-to guide from Enterprise Ireland.
- http://www.enterprise-ireland.com/ebusinesssite/guides/internal_security/internal_security_index.asp

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
HSPD-12 Privacy Policy Open in a new windowLink Details
- Sample privacy policy including Privacy Act systems of records notices, Privacy Act statements and a privacy impact assessment, designed to satisfy the requirements of HSPD-12 “Policy for a Common Identification Standard for Federal Employees and Contra
- http://www.whitehouse.gov/omb/memoranda/fy2006/m06-06_att.doc

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Network Security Policy Guide Open in a new windowLink Details
- Watchguard's guide to creating an overarching network information security policy, supported by subsidiary policies.
- http://www.watchguard.com/docs/whitepaper/securitypolicy_wp.pdf

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Modem Policy Open in a new windowLink Details
- Sample policy from Sandstorm, designed as an addition to an existing Remote Access Policy, if one exists, or simply to stand alone.
- http://www.sandstorm.net/products/phonesweep/modempolicy.php

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Information Security Policy Open in a new windowLink Details
- An information security policy from the University of Illinois.
- http://www.obfs.uillinois.edu/manual/central_p/sec19-5.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Telecommuting/Teleworking Policy Open in a new windowLink Details
- Sample policy on teleworking covering employment as well as information security issues.
- http://www.womans-work.com/teleworking_policy.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
K-20 Network Acceptable Use Policy Open in a new windowLink Details
- Policy on acceptable use of a school network, along with information for parents and an informed consent form. Developed in Washington State.
- http://www.k12.wa.us/K-20/AUPSchBoardNetworkUse.aspx

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
IP Network Security Policy Open in a new windowLink Details
- Example security policy to demonstrate policy writing techniques introduced in three earlier articles.
- http://www.securityfocus.com/infocus/1497

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
ISO 27001 Policies Open in a new windowLink Details
- Typical headings for a security policy aligned broadly with the ISO/IEC standard for information security management systems.
- http://www.27001-online.com/secpols.htm

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Company Email Policy Open in a new windowLink Details
- A menu of clauses suitable for email acceptable use policies.
- http://www.cli.org/emailpolicy/top.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing
Use of Electronic Mail Open in a new windowLink Details
- Policy from the University of Colorado on the use of, access to, and disclosure of electronic mail.
- http://www.cusys.edu/~policies/General/email.html

Lock this listing - So it can't be removedLock this listing - and upgrade it to FeaturedReport this listing

Submit a Featured Link: [$19.00]  Submit a Regular Link: [$9.00]