Cybersecurity Policy Templates

​We can assist you with 50+ Cybersecurity Policies & Procedures that align with MPA Content Security Best Practices. Check out our library of cybersecurity
policy templates below to get you started.
How it works

BROWSE

OUR

POLICIES

1

Browse through the policies and find the solutions that meet your needs and requirements.

CHOOSE

POLICIES TO PURCHASE

2

Let us know which templates you are interested in.  We will then issue you with an invoice.

RECEIVE

RE-BRANDED DOCUMENTS

4

Re-branded documents are delivered in Microsoft Office format in within 5 business days, so when you receive the documentation, you can also edit it for your specific needs.

Cybersecurity Policy Template Shop

 

Important Notes:

  1. Templates provided on this website are designed to provide affordable DIY solutions that align with MPA Content Security Best Practices.

  2. Ensure you read the "Read Me" to complete the templates for your facility.

  3. If you need assistance developing additional policies for your facility don’t hesitate to contact us.

  4. You are purchasing a digital product and not a legal service when you purchase templates.

  5. Due to the digital nature of this product, once downloaded, there is no refund.

Request for Quote

 

Please complete the form below in order to receive a quote for the Cybersecurity Policy Templates. Please ensure you use your company email address and phone number. (Note that private email address such as gmail.com or hotmail.com will not be accepted)

 

Choose the Cybersecurity Templates you are wanting to purchase

Thanks! We've received your request and we will be in touch with you shortly!

Have questions about what policies you require?

Cybersecurity Policies we can develop for your organisation.

 

Corporate Governance Policy Templates

 

  1. Company Structure

  2. Segregation of Duties

  3. Machine Room, Data Center, Vault, Safe Access List

  4. VPN Access List

  5. Non-Disclosure Agreement

  6. Social Media Policy

  7. Personnel On-boarding

  8. Personnel Off-boarding

  9. Anonymous Reporting

  10. Client Security Requirements

  11. Security Management Team Roles, Responsibilities, Activities

  12. Incident Response Team Roles, Responsibilities, Activities

  13. Data Breach and Incident Response and Notification

 

 

Employees, Freelancers, Third-Parties Policy Templates

  1. New hires and terminations for the last 12-months

  2. Employee Non-Disclosure Agreement

  3. Freelancer / Third-Party Non-Disclosure Agreement

  4. Visitor Non-Disclosure Agreement

  5. Acceptable Use

  6. Conditions of Employment

  7. Employee ID

  8. Third-Party Personnel Monitoring

  9. Employee Termination Checklist

 

Visitors Policy Templates

  1. Visitor Escort Policy

  2. Visitor ID

 

Risk Assessment Policy Templates

  1. Risk Assessment Negative Scenarios

  2. Business Continuity Plan

  3. Disaster Recovery Plan

Facility Policy Templates

 

  1. Facility and Data Centre Floor Plate

  2. List of Entrance and Exit Points

  3. Power Outage Contingency Plan

  4. Temperature and Humidity Monitoring

  5. Key / Prox Card / Fob / Biometric Issuance, Update, Review

 

Infrastructure Policy Templates

  1. Infrastructure Inventory

  2. Digital Devices Use

  3. Mobile Phone Use

  4. CCTV Verification

  5. Network, VPN, Infrastructure, Storage Architecture Diagrams

  6. Network Connection Review

  7. Risk Assessment Penetration Test

  8. Firewall Management and Alerting

  9. Computing Device Secure Configuration and Hardening

  10. Workstation Hardening

  11. Server Hardening

  12. Network and Communications Hardening

  13. Storage Hardening

  14. Change Management

  15. Patch Management

  16. Vulnerability Assessment

  17. Open Switch Ports

  18. Security Log Review

  19. VPN Access Log Review

  20. Directory Account Creation / Management

  21. Password Policy

  22. Backup and Recovery

 

Workflow Policy Templates

  1. Content Ingest, Logging, Tracking, Internal Processing, Delivery Workflow

  2. Content Destruction

  3. Content Transfer / Approvals

 

Training Policy Templates

  1. Senior Management Security Obligations

  2. Security Awareness Training Program