Cybersecurity Policies

Helping you build the cyber resilience you need to confidently grow your facility, by reducing the complexity of cyber compliance & governance.

FREE Cyber Security Policy Templates

MPA Content Security Best Practices Aligned

Please complete the form below in order to receive your policy templates. Please ensure you use your company email address and phone number. (Private email address such as or will not be accepted)



What Do I Receive?

The following policy templates are ready to be tailored to your facilities' needs and should be considered a starting point for setting up your governance program.

  1. Non-Disclosure Agreement

  2. Social Media Policy

  3. Personnel On-boarding

  4. Personnel Off-boarding




We work with you to develop Governance Policies and Procedures that are required to be developed and delivered as part of the TPN Assessment process.



Our CyberSecurity Policy Pack is completely free for you!

See what's included in the

Policy Pack and download from the link below.



Onsite or remote TPN Assessment where we audit your facility with one of our Accredited TPN Assessors. We offer both onsite or remote audits as well as Pre and Post Assessment Consulting and Engineering.


We can assist you with

50+ Cybersecurity Policies & Procedures

that align with MPA Content Security

Best Practices.

Free Policy Templates to get you started


  1. Non-Disclosure Agreement

  2. Social Media Policy

  3. Personnel On-boarding

  4. Personnel Off-boarding


Corporate Governance Policy Templates

  1. Company Structure

  2. Segregation of Duties

  3. Machine Room, Data Center, Vault, Safe Access List

  4. VPN Access List

  5. Social Media

  6. Anonymous Reporting

  7. Client Security Requirements

  8. Security Management Team Roles, Responsibilities, Activities

  9. Incident Response Team Roles, Responsibilities, Activities

  10. Data Breach and Incident Response and Notification

Employees, Freelancers, Third-Parties Policy Templates

  1. New hires and terminations for the last 12-months

  2. Employee Non-Disclosure Agreement

  3. Freelancer / Third-Party Non-Disclosure Agreement

  4. Visitor Non-Disclosure Agreement

  5. Acceptable Use

  6. Conditions of Employment

  7. Employee ID

  8. Third-Party Personnel Monitoring

  9. Employee Termination Checklist


Visitors Policy Templates

  1. Visitor Escort Policy

  2. Visitor ID


Risk Assessment Policy Templates

  1. Risk Assessment Negative Scenarios

  2. Business Continuity Plan

  3. Disaster Recovery Plan

Facility Policy Templates

  1. Facility and Data Centre Floor Plate

  2. List of Entrance and Exit Points

  3. Power Outage Contingency Plan

  4. Temperature and Humidity Monitoring

  5. Key / Prox Card / Fob / Biometric Issuance, Update, Review

Infrastructure Policy Templates

  1. Infrastructure Inventory

  2. Digital Devices Use

  3. Mobile Phone Use

  4. CCTV Verification

  5. Network, VPN, Infrastructure, Storage Architecture Diagrams

  6. Network Connection Review

  7. Risk Assessment Penetration Test

  8. Firewall Management and Alerting

  9. Computing Device Secure Configuration and Hardening

  10. Workstation Hardening

  11. Server Hardening

  12. Network and Communications Hardening

  13. Storage Hardening

  14. Change Management

  15. Patch Management

  16. Vulnerability Assessment

  17. Open Switch Ports

  18. Security Log Review

  19. VPN Access Log Review

  20. Directory Account Creation / Management

  21. Password Policy

  22. Backup and Recovery

Workflow Policy Templates

  1. Content Ingest, Logging, Tracking, Internal Processing, Delivery Workflow

  2. Content Destruction

  3. Content Transfer / Approvals


Training Policy Templates

  1. Senior Management Security Obligations

  2. Security Awareness Training Program

Ready for your TPN Assessment
or have questions

Level 1, 888 Brunswick Street

New Farm, Queensland 4005

Phone: +61 439 876 057

  • Facebook - White Circle
  • LinkedIn - White Circle

​Copyright © 2021 Groundwire Security

ISO 27001

ISO 27001 Compliance & Assessment

ISO 27001 Assessment Process

Book a ISO 27001 Assessment

Cybersecurity Policies

Cyber Security Policy Templates


About us


Contact us

Site Map