Security Risk, Strategy & Governance - Templates & Policies

Security Policy Exception Approval Workflow

Use this workflow to help you formalize and document your policy exception approval process.

Checklist for Securing Remote Workers

Use this checklist to ensure that you are implementing all of the IT security best practices when you are working from home or away from the office.

End-User Security Knowledge Test Template

This template provides example survey questions to ask an organization’s end users to assess their current level of understanding of security topics and organizational...

Security Awareness and Training Feedback Template

This template will provide you with example survey questions to ask an organization’s end users in order to collect feedback on security training.

Security Awareness and Training Module Builder and Training Schedule

This tool will help you plan out a training schedule for the different end-user groups and the topics that need to be delivered.

General Security – User Acceptable Use Policy

Use this template to develop a comprehensive user-facing acceptable use policy to formalize various aspects of security that are relevant to your end users.

Example Data Flow Diagram – e-Commerce

Use this example as a starting point to documenting your data flow diagrams.

Subject Access Request (SAR) Process Checklist

Use this checklist to validate that you have prepared for all steps of the request process.

Draft Subject Access Request (SAR) Landing Page Template

Use this template to document what will be included on your subject access request landing page.

Subject Access Request (SAR) Procedure

Use this template to build procedures for subject access requests.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us