Information Security Policies Made Easy

The “Gold Standard” information security policy template library!

Information Security Policies Made Easy is the worlds leading information security policy template library, with over 50 pre-written information security policy templates covering over 200 security topics and mapped to multiple frameworks including ISO 27002, NIST CSF, HIPAA, CMMC and more!  Based on the 35 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies.

ISPME is now part of ComplianceShield!

All of the quality security policy templates you expect plus regular updates and the automation of ComplianceShield.   Simply enter your organization information and GO!   Custom Security Policy documents created in minutes.   See how it works!

Save Thousands developing policies

The ISPME Policy Template Library is the quickest way to develop a complete set of written information security policies.  Now part of ComplianceShield – Content Essentials with more policies, more updates and more features!  Save thousands developing security policies!

Only $1200.00 USD

Fifty (50+) essential sample security policy documents:

  • A comprehensive set of information security policy documents, all mapped to our Common Policy Library.
  • Complete coverage of essential security topics including: Access Control Policy, Network Security Policy, Personnel Security, Information Classification, Physical Security, Acceptable Use of Assets, and many more.  (See the list)
  • All samples policies in our MS-Word Best Practices Policy Template. Customized in minutes!

Complete information security policy statement library

  • 1600+ individual security policies covering of the latest technical, legal and regulatory issues.
  • Mapping to our Common Policy Library (CPL) with complete coverage for leading cyber security frameworks such as ISO 27002 and NIST CSF.
  • Expert commentary discussing the risks mitigated by each policy
  • Target audience (management, technical, or user) and security environment (low, medium, high) for each policy
  • Policy coverage maps for NIST CSF, ISO 27002, FFIEC, HIPAA-HiTECH security and more.

Expert information security policy development advice and tools

  • A step-by-step checklist of security policy development tasks to quickly start a policy development project
  • Helpful tips and tricks for getting management buy-in for information security policies and education
  • Tips and techniques for raising security policy awareness
  • Real-world examples of problems caused by missing or poor information security policies
  • Essential policy compliance forms such as Risk acceptance memo, incident Reporting Form and Security Policy Compliance Agreement.
Information Security Policy Example

Comprehensive Information Security Policy Coverage

Information Security Policies Made Easy covers over 200 essential information security topics including:

  • Access Control
  • Acceptable Use
  • Application Development
  • Biometrics
  • Computer emergency response teams
  • Computer viruses
  • Contingency planning
  • Corporate Governance
  • Data Classification and Labeling
  • Data Destruction
  • Digital signatures
  • Economic Espionage
  • Electronic commerce
  • Electronic mail
  • Employee surveillance
  • Encryption
  • Firewalls
  • FAX communications
  • Incident Response
  • Identity Theft
  • Information Ownership
  • Information Security Related Terrorism
  • Local area networks
  • Intranets
  • Logging controls
  • Mobile Devices
  • Network Security
  • Outsourcing security functions
  • Password Management
  • Personnel Screening and Security
  • Portable computers (PDA, Laptops)
  • Physical Security
  • Privacy issues
  • Security Roles and Responsibilities
  • Social Engineering (including “phishing”)
  • SPAM Prevention
  • Telecommuting
  • Telephone systems
  • Third Party Access
  • User security training
  • Web Site Security
  • Wireless Security
  • Voice Over IP (VOIP)
  • And many more!

Information Security Policies Made Easy is available for immediate electronic access via ComplanceShield. Each product contains a print-ready PDF, MS-Word templates and an organization-wide license to republish the materials.