Securitydox customizable policies and procedures templates align with security best-practices and are based on NIST 800-53 (v4). Templates are provided in Word format for easy editing.
Document | NIST 800-53 Controls | |
---|---|---|
(AC 1-8 11 14 22) Logical Access Controls Policy & Procedures | AC 1, 2, 3, 4, 5, 6, 7, 8, 11, 14, 11 | Sample |
(AC 17 18) Remote and Wireless Access Controls Policy & Procedures | AC 17, 18 | |
(AC 19 20) Mobile Device Access Controls & External Systems Use Policy & Procedures | AC 19, 20 | |
(AU 1-6 8-9 11-12) Audit and Accountability Policy & Procedures | AU 1, 2, 3, 4, 5, 6, 8, 9, 11, 12 | Sample |
(AT 1 2) Security Awareness and Training Policy & Procedures | AT 1, 2 | Sample |
(CM 1-11) Configuration Management Policy & Procedures | CM 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 | |
(CP 1-10) Contingency Planning Policy & Procedures | CP 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 | |
(IA 1-8) Identification and Authentication Policy & Procedures | IA 1, 2, 3, 4, 5, 6, 7, 8 | |
(IR 1-8) IT Incident Response Policy & Procedures | IR 1, 2, 3, 4, 5, 6, 7, 8 | |
(MP 1-7) Media Protection Policy & Procedures | MP 1, 2, 3, 4, 5, 6, 7 | |
(PS 1-8) IT Personnel Security Policy & Procedures | PS 1, 2, 3, 4, 5, 6, 7, 8 | |
(PE 1-18) Physical and Environmental Protection Policy & Procedures | PE 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 | |
(RA 1-5) IT Risk Assessment Policy & Procedures | RA 1, 2, 3, 4, 5 | |
(CA 1-3 5-9) IT Security Assessment and Authorization Policy & Procedures | CA 1, 2, 3, 5, 6, 7, 8, 9 | |
(SC 1-5 7 14 15 20-22 39) IT System and Communications Protection Policy & Procedures | SC 1, 2, 3, 4, 5, 7, 14, 15, 20, 21, 22, 39 | |
(SC 8 9 12 13 17 23 28) IT System and Communications Encryption Policy & Procedures | SC 8, 9, 12, 13, 17, 23, 28 | |
(SI 1-5 8-10 12) IT System and Information Integrity Policy & Procedures | SI 1, 2, 3, 4, 5, 8, 9, 10, 12 | |
(SA 1-11) IT System and Services Acquisition Policy & Procedures | SA 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 | |
(MA 1 2 4 5) IT System Maintenance Policy & Procedures | MA 1, 2, 4, 5 | |
(PL 1-4 6) IT System Security Planning Policy & Procedures | PL 1, 2, 3, 4, 6 | |
Security Policies and Procedures Document Register | ||
IT Glossary |
For questions, to purchase our templates, or to get more information (e.g. pricing) Click here.