Procedure Templates

€49.00

Purchase

At the very heart of Information Security lay the principles of Authentication, Authorization and Accountability, also known as AAA. In plain language, these principles state that: a. Every action of…

€49.00

Purchase

The objective of this procedure is to ensure the security of Company’s assets. Effective security controls in relation to access the data are an essential component of the effective risk…

€49.00

Purchase

The Access Control System Security Standard specifies the requirements with respect to the "need-to-know / need to have" principle, segregation of duties, user account management, access management, logging and access…

€79.00

Purchase

The Anti-Corruption Policy establishes principles and standards designed to prevent violations of applicable anti-bribery laws and regulations.

€49.00

Purchase

The Antivirus Policy was developed by the Company in order define the antivirus policy on every computer or server including how often a virus scan is done, how often updates…

€49.00

Purchase

The Antivirus Policy and Guideline Work Instruction describes the measures taken by the Company to protect the company IT Office systems (PC, Laptop, Servers) against viruses, spyware, trojans and other…

€79.00

Purchase

The Antivirus Policy and Procedure explains the policy and procedure that governs the use of anti-virus software within the Company. The policy gives guidance and direction on minimizing the risk…

€49.00

Purchase

This standard documents the security requirements for Company’s Application Security and Development. This standard is aligned to Company’s Systems Management Policy and must be applied to all applications written and…

€49.00

Purchase

The Application Security Architecture Guidelines is a walkthrough on the security concepts of application architecture.