Use Info-Tech's Security Threat Detection and Event Management Policy to outline the measures taken for proper identification and mitigation of malicious activity.
Use this tool in conjunction with the project blueprint, Develop and Deploy Security Policies.