~3-page information security policy template on the privileges needed to install, use and manage IT systems.
Controlling access to and use of privileged user identities is fundamental for IT systems security since most other technical system security controls can be overridden or disabled by privileged users. Access to and use of privileges are to be restricted according to the information risks associated with various IT and communications systems, devices, applications etc., plus the competence and trustworthiness of the workers concerned.
Delivered as an editable MS Word document, easily customized for your organization's specific needs.
IT privileges policy
$20.00Price
Information security policy template on IT systems privileges
See also the policies on:
- Information governance
- Information ownership
- Information risk management
- Information classification
- Trust
- Cybersecurity
- Insider threats
- Outsider threats
- Identification and authentication
- Access control
- Information security architecture and design
- IT systems development and acquisition
- Network security
- IT systems implementation
- Backups and archives
- Cloud computing
- Internet of Things
- Bring Your Own Device
- Change and configuration management
- Patching and updating software\
- Assurance
- Trust
- Monitoring and surveillance
- IT auditing
- Hacking
- Malware
- Social engineering
- Security awareness and training