Building a Policy Portal: Part 1 -Typical Types of Policies

Building a Policy Portal: Part 1 -Typical Types of Policies

In this first part of a series on building a policy portal for your organization, I will be covering the types of policies, procedures, plans and etc that may end up in your portal.

Security Governance Policies

  • Bring Your Own Device & Technology
  • Business Secrets Policy
  • Context and Alignment Policy
  • Cybersecurity Policy
  • Cybersecurity Framework Policy
  • Documentation Policy
  • E-mail Policy
  • Green Computing Policy
  • IT Governance Policy
  • IT Management Policy
  • Information Security Policy
  • Mass Communication Policy
  • Mergers and Acquisitions Policy
  • Mobile Device Policy
  • Portable Computing Policy
  • Production Input Output Controls Policy
  • Release Management Policy
  • Reporting Violations Policy
  • Security Policy
  • Smartphone Policy
  • Social Networking Policy
  • Staffing Policy
  • Standard Operating Procedure Policy
  • Supply Chain Risk Management Policy
  • System and Communications Protection Policy
  • System and Information Integrity Policy
  • System and Services Acquisition Policy
  • Wearable Computing Device Policy

Technical Security Policies

  • Acceptable Use Policy
  • Access Control Policy
  • Access Control Procedure
  • Account Management Policy
  • Acquisition and Procurement
  • Admin Special Access Policy
  • Anti-Malware Policy
  • Anti-Malware Procedure
  • Asset Management Policy
  • Audit Trails Policy
  • Backup Plan
  • Backup Policy
  • Backup Procedure
  • Bluetooth Policy
  • Certification and Accreditation Policy
  • Change Management Policy
  • Change Management Procedure
  • Configuration Management Plan
  • Configuration Management Policy
  • Data Analytics Policy
  • Data Integrity Policy
  • Data Marking Policy
  • Data Privacy Policy
  • Data Retention Policy
  • Database Security Policy
  • Disposal Policy
  • Domain Controller Policy
  • Domain Name System Policy
  • E-commerce Policy
  • Encryption Policy
  • Facility Security Plan
  • Firewall Hardening Procedure
  • Firewall Policy
  • Firewall Procedure
  • Guest Access Policy
  • Hardware and Software Maintenance Policy
  • Hardware and Software Maintenance Procedure
  • Identification and Authentication
  • Internet Connection Policy
  • Logging Policy
  • Logging Procedure
  • Logical Access Controls Policy
  • Media Protection Policy
  • Network Address Policy
  • Network Configuration Policy
  • Network Documentation Policy
  • Network Security Policy
  • Password Policy
  • Patch Management Policy
  • Patch Management Procedure
  • Personnel Security Policy
  • Physical Access Policy
  • Physical Security Policy
  • Planning Policy
  • Problem Management Policy
  • Problem Management Procedure
  • Program Management Policy
  • Procedure Template
  • Ransomware Policy
  • Receipt & Acknowledgement
  • Remote Access Policy
  • Removable Media Policy
  • Router Security Policy
  • Securing Information Systems Policy
  • Securing Sensitive Information Policy
  • Security Architecture Policy
  • Security Monitoring Policy
  • Server Certificates Policy
  • Server Hardening Policy
  • Server Hardening Procedure
  • Software Licensing Policy
  • System Security Plan
  • System Update Policy
  • Terms and Definitions Policy
  • User Privilege Policy
  • Vendor Access Policy
  • VPN Policy
  • Wireless Access Policy
  • Workstation Hardening Procedure
  • Workstation Security Policy

Compliance Policies

  • Audit Policy
  • Clear Desk Policy
  • Compliance Policy
  • Compliance and Standards Matrix
  • Ethics Policy
  • GDPR EU Privacy and Data Protection
  • Health Safety Policy
  • HIPAA and HITECH Policy
  • HITRUST Policy
  • Identity Theft Protection Policy
  • Outsourcing Policy
  • PCI Policy
  • PII Processing Transparency Policy
  • Privacy Policy (CCPA, CPRA, & others)
  • Protecting CUI NIST 800-171 Policy
  • Security Awareness and Training Plan
  • Security Awareness and Training Policy
  • Security Controls Review Policy
  • Security Privacy Controls NIST 800-53 Policy
  • System Controls SOC2 Policy
  • Third Party Service Providers Policy
  • Vulnerability and Penetration Testing
  • Web Site Privacy Policy

Risk Management Policies

Risk Management Policies

  • Business Impact Analysis Policy
  • Data Classification Policy
  • Quality Assurance Policy
  • Risk Assessment Policy
  • Risk Management Policy
  • Security Self Assessment Policy

Incident Response Policies & Plans

  • Identity Theft Protection Policy
  • Incident Response Plan
  • Incident Response Policy
  • Intrusion Detection Policy

Business Continuity Policies & Plans

  • Business Continuity Communications
  • Business Continuity Disaster Recovery
  • Business Continuity Department Plan
  • Business Continuity Plan
  • Business Continuity Policy
  • Business Continuity Resumption Plan
  • Resilience Policy

Application Security Policies

  • Application Implementation Policy
  • Approved Application Policy
  • Secure Software Development Lifecycle
  • Software Development Policy
  • Web Site Policy


Share Tweet Send
0 Comments
Loading...
You've successfully subscribed to Songer Tech
Great! Next, complete checkout for full access to Songer Tech
Welcome back! You've successfully signed in
Success! Your account is fully activated, you now have access to all content.