Information Security Policies Made Easy

Information Security Policies Made Easy  is the “gold standard” information security policy template library, with over 1600 pre-written information security policies covering over 200 security topics.  Based on the 35 year consulting experience of Charles Cresson Wood, CISSP, CISA, it is the most widely used policy library in the world, with over 10,000 customers in 60 countries. Take the work out of creating, writing, and implementing security policies.

Information Security Policies Made Easy

Information Security Policies Made EasyOnly $795

Information Security Policy: The Definitive Library

Information Security Policies Made Easy has everything you need to save money while building a robust security policy program, including:

Forty (40) essential sample security policy documents:

  • A comprehensive set of information security policy documents, all mapped to our Common Policy Library.
  • Complete coverage of essential security topics including: Access Control Policy, Network Security Policy, Personnel Security, Information Classification, Physical Security, Acceptable Use of Assets, and many more.  (See the list)
  • All samples policies in our MS-Word Best Practices Policy Template. Customized in minutes!

 

Complete information security policy statement library

  • 1600+ individual security policies covering of the latest technical, legal and regulatory issues.
  • Mapping to our Common Policy Library (CPL) with complete coverage for leading cyber security frameworks such as ISO 27002 and NIST CSF.
  • Expert commentary discussing the risks mitigated by each policy
  • Target audience (management, technical, or user) and security environment (low, medium, high) for each policy
  • Policy coverage maps for NIST CSF, ISO 27002, FFIEC, HIPAA-HiTECH security and more.Information Security Policy Example

Expert information security policy development advice and tools

  • A step-by-step checklist of security policy development tasks to quickly start a policy development project
  • Helpful tips and tricks for getting management buy-in for information security policies and education
  • Tips and techniques for raising security policy awareness
  • Real-world examples of problems caused by missing or poor information security policies
  • Essential policy compliance forms such as Risk acceptance memo, incident Reporting Form and Security Policy Compliance Agreement.

Comprehensive Information Security Policy Coverage

Information Security Policies Made Easy covers over 200 essential information security topics including:

  • Access Control
  • Acceptable Use
  • Application Development
  • Biometrics
  • Computer emergency response teams
  • Computer viruses
  • Contingency planning
  • Corporate Governance
  • Data Classification and Labeling
  • Data Destruction
  • Digital signatures
  • Economic Espionage
  • Electronic commerce
  • Electronic mail
  • Employee surveillance
  • Encryption
  • Firewalls
  • FAX communications
  • Incident Response
  • Identity Theft
  • Information Ownership
  • Information Security Related Terrorism
  • Local area networks
  • Intranets
  • Logging controls
  • Mobile Devices
  • Network Security
  • Outsourcing security functions
  • Password Management
  • Personnel Screening and Security
  • Portable computers (PDA, Laptops)
  • Physical Security
  • Privacy issues
  • Security Roles and Responsibilities
  • Social Engineering (including “phishing”)
  • SPAM Prevention
  • Telecommuting
  • Telephone systems
  • Third Party Access
  • User security training
  • Web Site Security
  • Wireless Security
  • Voice Over IP (VOIP)
  • And many more!

Information Security Policies Made Easy, Version 14 is available for immediate electronic download. Each product contains a print-ready PDF, MS-Word templates and an organization-wide license to republish the materials.