MPA TPN Cyber Security Policy Templates

​MPA Content Security Aligned
Security Manual & Policies

​What's included in the 
TPN GRC Toolkit US$495

Security Manual & 10 Policy Templates

  • Information Security Manual (21 Pages)

  • Remote Working / Work from Home Policy (10 Pages)

  • Security Hardening Policy (10 Pages)

  • Risk Assessment & Management Policy (8 Pages)

  • Data Breach Incident Response & Incident Response Policy (11 Pages)

  • Acceptable use Laptops Mobile & Recording Devices Policy (14 Pages)

  • Non-Disclosure Agreement (8 Pages)

  • Social Media Policy (8 Pages)

  • Personnel On-boarding (7 Pages)

  • Personnel Off-boarding (8 Pages)

  • Password Policy (9 Pages)

 

ISMS Program, Calendar & Guidelines

  • ISMS Adoption, Bootstrap and Program Calendar Activities

  • TPN Assessment Materials Request (List of supporting documentation required prior to an assessment)

  • Facility Policy and Procedure Development (List of policies that are required for your facility. The list is not exhaustive. Additional policies and procedures may need to be required depending on your facility type and needs).

  • MPA Best Practices Common Guidelines

How to Purchase

1. REQUEST A QUOTE

Request a quote and we will issue you with an invoice for the Security Policy Templates.

3. RECEIVE BRANDED DOCUMENTS

Branded documents are delivered in within 2 business days and in MS .doc so you can edit it for your specific needs.

REQUEST A QUOTE

Please complete the form below in order to receive a quote for the Cybersecurity Policy Templates. Please ensure you use your company email address and phone number. (Note that private email address such as gmail.com or hotmail.com will not be accepted).

Thanks, we will be in touch with you shortly.

Prefer to have a chat? Call us instead
Phone: +61 439 876 057

 

Important Notes:

  1. Templates provided on this website are designed to provide affordable DIY solutions that align with MPA Content Security Best Practices.

  2. Ensure you read the "Read Me" to complete the templates for your facility.

  3. If you need assistance developing additional policies for your facility don’t hesitate to contact us.

  4. You are purchasing a digital product and not a legal service when you purchase templates.

  5. Due to the digital nature of this product, once downloaded, there is no refund.

  6. Price is in USD and excludes all local and government taxes.

Cybersecurity Policy Templates

Cybersecurity Policies we can
develop for your organisation

 

Corporate Governance Policy Templates

  1. Company Structure

  2. Segregation of Duties

  3. Machine Room, Data Center, Vault, Safe Access List

  4. VPN Access List

  5. Non-Disclosure Agreement

  6. Social Media Policy

  7. Personnel On-boarding

  8. Personnel Off-boarding

  9. Anonymous Reporting

  10. Client Security Requirements

  11. Security Management Team Roles, Responsibilities, Activities

  12. Incident Response Team Roles, Responsibilities, Activities

  13. Data Breach and Incident Response and Notification

 

 

Employees, Freelancers, Third-Parties Policy Templates

  1. New hires and terminations for the last 12-months

  2. Employee Non-Disclosure Agreement

  3. Freelancer / Third-Party Non-Disclosure Agreement

  4. Visitor Non-Disclosure Agreement

  5. Acceptable Use

  6. Conditions of Employment

  7. Employee ID

  8. Third-Party Personnel Monitoring

  9. Employee Termination Checklist

 

Visitors Policy Templates

  1. Visitor Escort Policy

  2. Visitor ID

 

Risk Assessment Policy Templates

  1. Risk Assessment Negative Scenarios

  2. Business Continuity Plan

  3. Disaster Recovery Plan

Facility Policy Templates

  1. Facility and Data Centre Floor Plate

  2. List of Entrance and Exit Points

  3. Power Outage Contingency Plan

  4. Temperature and Humidity Monitoring

  5. Key / Prox Card / Fob / Biometric Issuance, Update, Review

 

Infrastructure Policy Templates

  1. Infrastructure Inventory

  2. Digital Devices Use

  3. Mobile Phone Use

  4. CCTV Verification

  5. Network, VPN, Infrastructure, Storage Architecture Diagrams

  6. Network Connection Review

  7. Risk Assessment Penetration Test

  8. Firewall Management and Alerting

  9. Computing Device Secure Configuration and Hardening

  10. Workstation Hardening

  11. Server Hardening

  12. Network and Communications Hardening

  13. Storage Hardening

  14. Change Management

  15. Patch Management

  16. Vulnerability Assessment

  17. Open Switch Ports

  18. Security Log Review

  19. VPN Access Log Review

  20. Directory Account Creation / Management

  21. Password Policy

  22. Backup and Recovery

 

Workflow Policy Templates

  1. Content Ingest, Logging, Tracking, Internal Processing, Delivery Workflow

  2. Content Destruction

  3. Content Transfer / Approvals

 

Training Policy Templates

  1. Senior Management Security Obligations

  2. Security Awareness Training Program