SOC 2 Policies

11 templates mapped to SOC 2.

Advanced Policies$99.00

Machine Identity Management Policy

Enterprise-grade machine identity management policy addressing the 82:1 machine-to-human identity ratio in modern enterprises. Covers service account governance, API key management, certificate lifecycle automation, secrets management, SSH keys, cloud workload identity, Kubernetes service accounts, IoT device identity, and SPIFFE/SPIRE implementation. Includes controls for orphaned accounts, excessive privileges, and compliance with NIST SP 800-63B, ISO 27001:2022, and PCI DSS 4.0.

PDF
View Details
Core 25$39.00

Asset Management Policy

A complete asset management framework covering hardware, software, cloud resources, IoT devices, and mobile assets throughout their entire lifecycle. Includes detailed inventory templates, disposal procedures, and compliance questionnaires for modern IT environments.

PDF
View Details
Core 25$39.00

Information Classification and Handling Policy

Comprehensive policy establishing data classification levels, handling procedures, labeling requirements, and lifecycle management integrated with DLP and compliance frameworks including GDPR, HIPAA, and PCI DSS.

PDF
View Details
Core 25$29.00

Social Media Policy

A complete social media policy addressing corporate account security, employee personal use guidelines, NLRA compliance, brand protection, crisis response, and emerging threats including deepfakes and AI-generated content. Includes security checklists, incident response procedures, and practical implementation guidance.

PDF
View Details
Core 25$29.00

Acceptable Use Policy

Comprehensive acceptable use policy aligned with ISO 27001:2022, NIST SP 800-53 Rev. 5, and CIS Controls v8.1, featuring 2025 best practices for generative AI, BYOD, remote work, and modern workplace technology usage.

PDF
View Details
Core 25$49.00

Network Security Policy

Enterprise-grade network security policy incorporating Zero Trust Architecture, microsegmentation, SD-WAN security, and advanced threat protection aligned with NIST SP 800-207, CIS Controls v8.1, PCI DSS 4.0, and ISO 27001:2022 standards.

PDF
View Details
Core 25$49.00

Risk Management Policy

Comprehensive policy establishing governance, assessment, and treatment of information security and cyber risks using 2025/2026 best practices including quantitative risk analysis, AI/ML risk management, and board-level reporting.

PDF
View Details
Core 25$49.00

Information Security Policy

Establishes executive commitment to information security and provides the governance framework for all organizational security policies, aligned with ISO 27001:2022, NIST CSF 2.0, and CIS Controls v8.1.

PDF
View Details
Core 25$49.00

Cloud Computing Security Policy

Enterprise-grade cloud security policy covering IaaS, PaaS, SaaS, container security, serverless architectures, and multi-cloud environments. Includes CSPM checklist, cloud security assessment questionnaire, and platform-specific guidance for 2025/2026.

PDF
View Details
Extended$99.00

Third-Party Risk Management Policy

Advanced policy for managing third-party, fourth-party, and supply chain cybersecurity risks through vendor classification, due diligence, continuous monitoring, and contractual controls. Includes 2025/2026 requirements for DORA ICT third-party risk, software supply chain security (SBOM/SLSA), AI/ML vendor assessment, and geopolitical risk management.

PDF
View Details