Operations Management policies and procedures

Operations Management Bundle

This bundle contains all the products listed in the Operations Management section.

Take advantage of the 25% OFF when buying the bundle!

The Bundle includes the following templates:

Antivirus Policy
Antivirus Policy and Guideline Work Instruction
Antivirus Policy and Procedure
Audio and Web Conferencing Services Usage Policy
Backup and Recovery Standard
Backup and Restore Procedure
Backup Standard
Business Continuity Management Policy
Business Continuity Management Policy – Template 2
Business Continuity Plan Procedure
Capacity Management Policy
Crisis Management Plan
Data Backup Procedure – Template 1
Data Backup Procedure – Template 2
Equipment Hardening Procedure
Firewalls Administration Procedure
Incident Handling Standard
Incident Management Procedure
Incidents and Problems Management Procedure
Internet Hosting and DMZ Standard
IT Operation and Maintenance Policy
Microsoft SQL Server Gold Build Security Standard
Monitoring of System Use Policy
Network Security Policy
Network Security Standard
Network Security Standard – Template 2
Protection Against Malicious Software Policy
Security Logging Policy
System Operations Standard
Systems Management Policy
Technical Vulnerability Management and Control of Malware Standard
Use of Network Services Policy
Vulnerability Alerts Procedure
Vulnerability Management Standard
Web Server Standard

Review Operations Management Bundle.

Related Products:

€49.00

Purchase

The objective of this standard is to define the minimum backup parameters to ensure that mission critical applications, data and archives and Company business applications, user’s data and archives are adequately preserved and protected against data loss and destruction in a format suitable for timely restore and recovery.

€49.00

Purchase

Identity and Access Management Standard describes the management of individuals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks. This standard documents the security requirements for identity and access management within the Company. The objectives of the […]

€79.00

Purchase

The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically, this Standard focuses on key management requirements, acceptable algorithms, appropriate key lengths, and raises pertinent regulatory considerations relating to the use of cryptography. Cryptographic controls […]