© 2019 IsecT Limited, New Zealand      Get in touch

4½-page generic information security policy on Identification and Authentication (I&A).


This policy mandates a range of controls with the purpose of identifying and authenticating anyone or anything attempting to access controlled resources such as secure areas, IT systems and applications.


Delivered as an editable MS Word document, easily customized for your organization's specific needs.

Identification and authentication policy

  • Template policy on I&A


    See also the policies on:

    • Information risk management
    • Information governance
    • Information ownership
    • Division of responsibilities
    • Cybersecurity
    • Physical security
    • Assurance
    • Hacking
    • Fraud
    • Social engineering