Written Information Security Program Template
Our list includes policy templates for acceptable use policy data breach response policy password protection policy and more.
Written information security program template. The iso version of the written information security program wisp is a comprehensive set of it security policies and standards that is based on theiso 27002 2013 framework and it can help your organization become iso 27002 compliant. Refer to appendix a. A standard document model written information security program wisp addressing the requirements of massachusetts s data security regulation and the gramm leach bliley act glba safeguards rule. Including laptops and portable devices that contain personal information.
A well written security policy should serve as a valuable document of. The written information security program wisp is updated as needed and at least annually by the director of information security section 3. Additionally a sample is provided. Our objective in the development and implementation of this written information security plan is to create effective administrative technical and physical safeguards in order to protect our customers non public personal information.
It contains cybersecurity policies and standards that align with nist 800 53 including nist 800 171 requirements. The inappropriate use of the resources of the organization. The prevention of wastes. This article outlines an incremental approach to rolling out an information security program.
Sans has developed a set of information security policy templates. Its scope is a bit wider than just writing an information security policy itself. A solid policy is built with straightforward rules standards and agreements that conform to industry best practices and regulatory requirements. This version of the written information security program wisp is based on the nist 800 53 rev4 framework.
Written information security program wisp nist 800 53 version. This iso based wisp is a comprehensive customizable easily implemented microsoft word document that contains the iso 27002 based policies control objectives. But it s important to understand how your policy will fit into a greater security strategy. Available resources for a template to complete the information classification activity.
An effective information security cybersecurity program requires a strategic approach and an information security cybersecurity policy is the foundation for success. These are free to use and fully customizable to your company s it security practices. A good information security policy template should address these concerns. Sample written information security plan i.
Identification of paper electronic and other records computing systems and storage media. An incremental approach to building an information security program. The protection of the valuable information of the organization.