Program Development and Change Management

Program Development and Change Management Bundle

This bundle contains all the products listed in the Program Development and Change Management section.

Take advantage of the 25% OFF when buying the bundle!

The Bundle includes the following templates:

Application Security and Development Standard
Application Security Architecture Guidelines
Application Security Standard
Application Testing Procedure
Change Management and Testing Procedure
Change Management Policy – Template 1
Change Management Policy – Template 2
Change Management Policy – Template 3
Change Management Policy – Template 4
Change Management Procedure – Template 1
Change Management Procedure – Template 2
Change Management Procedure for Front End Infrastructure
Configuration Management Procedure
Patch Management Policy
Patch Management Procedure
Secure Coding Standard
Segregation of IT Environments Standard
Software Patches Management Procedure
Software Testing Policy
System Development Procedure – Template 1
System Development Procedure – Template 2
Systems & Applications Development and Operations Policy

Review Program Development and Change Management Bundle.

Related Products:

€49.00

Purchase

The Cryptographic Control Policy intends to draw the general principles acceptable to the Company for the usage of cryptography. This policy applies to all employees and partners and to all electronic transactions wherein one or more of the abovementioned parties are involved. The Company will select appropriate cryptographic controls based on a risk assessment.

€79.00

Purchase

The objective of the Cryptographic Controls Standard is to outline the minimum information security controls which must be applied when cryptographic services and solutions are utilized by the Company. Specifically, this Standard focuses on key management requirements, acceptable algorithms, appropriate key lengths, and raises pertinent regulatory considerations relating to the use of cryptography. Cryptographic controls […]

€49.00

Purchase

This document highlights the standard requirements for Information Security Incident Handling within the Company.