21 templates mapped to NIST CSF 2.0.
Comprehensive policy establishing data classification levels, handling procedures, labeling requirements, and lifecycle management integrated with DLP and compliance frameworks including GDPR, HIPAA, and PCI DSS.
Enterprise-grade vulnerability management policy incorporating CVSS 4.0, EPSS scoring, CISA KEV catalog integration, and modern scanning methodologies for traditional IT, cloud, containers, and APIs. Includes detailed remediation SLAs, prioritization matrices, and compliance mappings for PCI DSS 4.0, ISO 27001:2022, and federal requirements.
Comprehensive policy establishing governance, assessment, and treatment of information security and cyber risks using 2025/2026 best practices including quantitative risk analysis, AI/ML risk management, and board-level reporting.
Establishes executive commitment to information security and provides the governance framework for all organizational security policies, aligned with ISO 27001:2022, NIST CSF 2.0, and CIS Controls v8.1.
Smart grid and distributed energy resource cybersecurity framework for modern electric utilities
Comprehensive cybersecurity framework for protecting 911 centers and first responder critical systems
Comprehensive physical and cybersecurity framework for protecting critical water infrastructure under AWIA requirements
Complete cybersecurity framework for upstream, midstream, and downstream oil and gas operations
Comprehensive Zero Trust implementation bundle covering all five pillars - Identity, Devices, Networks, Applications, and Data. Includes 47 policies, implementation roadmap, maturity assessment tools, and compliance mapping for NIST SP 800-207, CISA ZTM, and OMB M-22-09.
Advanced policy for managing third-party, fourth-party, and supply chain cybersecurity risks through vendor classification, due diligence, continuous monitoring, and contractual controls. Includes 2025/2026 requirements for DORA ICT third-party risk, software supply chain security (SBOM/SLSA), AI/ML vendor assessment, and geopolitical risk management.
NIST 800-53 Rev 5 access control family with Zero Trust architecture and least privilege implementation
NIST Cybersecurity Framework 2.0 Identify function implementation with GOVERN integration and asset management
NIST Cybersecurity Framework 2.0 Protect function with Zero Trust architecture and protective technology controls
NIST 800-53 Rev 5 contingency planning controls with disaster recovery and business continuity requirements
NIST Cybersecurity Framework 2.0 Respond function with incident response and communication requirements
NIST Cybersecurity Framework 2.0 Detect function with continuous monitoring and anomaly detection requirements
NIST Cybersecurity Framework 2.0 Recover function with business continuity and disaster recovery planning
NIST 800-53 Rev 5 identity and authentication controls with multi-factor authentication requirements
NIST 800-53 Rev 5 configuration management controls with baseline configuration and change control requirements
NIST 800-53 Rev 5 audit and accountability controls with comprehensive logging and monitoring requirements