20 templates to speed up your compliance work.
Step-by-step procedures for classifying and labeling organizational data
Step-by-step procedures for SOC operations and security monitoring
Step-by-step procedures for cloud infrastructure security operations
Step-by-step procedures for third-party security assessments
Step-by-step procedures for requesting and managing security policy exceptions
Step-by-step procedures for phishing incident investigation and response
Step-by-step procedures for investigating and resolving account lockouts
Step-by-step procedures for user access lifecycle management
Step-by-step procedures for safe malware analysis and triage
Step-by-step procedures for firewall rule management and changes
Step-by-step procedures for managing security awareness and training programs
Step-by-step procedures for digital forensics and audit evidence collection
Step-by-step procedures for facility and physical access security
Step-by-step procedures for secure data destruction and media disposal
Step-by-step procedures for managing internal and external penetration tests
Step-by-step procedures for data backup operations and disaster recovery
Step-by-step procedures for vulnerability assessment and remediation
Step-by-step procedures for cryptographic key lifecycle management
Step-by-step operational procedures for security incident handling
Step-by-step procedures for IT and security change control