Compliance & Templates

Downloadable policy templates, incident response playbooks, and compliance checklists

18 Templates PDF Download NIST Aligned

HR Security

3 templates

Employee Onboarding Security Checklist

Checklist

Account provisioning, access controls, security awareness training, equipment assignment, and acceptable use policy acknowledgment.

Employee Offboarding Security Checklist

Checklist

Account deprovisioning, access revocation, equipment return, knowledge transfer, and exit interview security review.

Security Awareness Training Plan

Plan

Annual training schedule, phishing simulation program, and compliance tracking for all employees.

Governance

4 templates

Acceptable Use Policy (AUP)

Policy

Defines acceptable and prohibited use of organizational IT resources, internet access, and data handling.

Information Security Policy

Policy

Comprehensive policy covering data classification, access controls, incident reporting, and security responsibilities.

Memorandum of Understanding (MOU)

Agreement

Template for inter-agency or vendor agreements covering data sharing, security requirements, and responsibilities.

Data Classification Policy

Policy

Framework for classifying data sensitivity levels and corresponding handling requirements.

Incident Response

4 templates

Incident Response Plan (NIST 800-61)

Plan

Complete IR plan aligned with NIST SP 800-61 Rev. 2 covering preparation, detection, containment, eradication, and recovery.

Ransomware Response Checklist

Checklist

Step-by-step checklist for responding to ransomware incidents including isolation, assessment, and recovery procedures.

Data Breach Notification Template

Template

Templates for notifying affected individuals, regulators, and law enforcement of data breaches per state requirements.

Incident Communication Plan

Plan

Internal and external communication templates and procedures during security incidents.

Operations

4 templates

Vulnerability Management Procedure

Procedure

Process for identifying, assessing, prioritizing, and remediating vulnerabilities across the organization.

Change Management Policy

Policy

Controls for managing changes to IT systems, including approval workflows and rollback procedures.

Backup and Recovery Procedure

Procedure

Data backup schedules, retention policies, and recovery testing procedures.

Patch Management Policy

Policy

Timelines and procedures for testing and deploying security patches across all systems.

Utility / NERC CIP Lite

3 templates

BES Cyber System Identification

Worksheet

Simplified worksheet for identifying Bulk Electric System cyber assets for small utilities.

Physical Security Perimeter Plan

Plan

Template for documenting physical security controls around critical cyber assets.

Electronic Access Control Procedure

Procedure

Procedures for managing electronic access to BES cyber systems.