0% found this document useful (0 votes)
24 views6 pages

CGRC Templates - Cyvitrix Learning

The document outlines various policy templates related to information security, risk management, asset classification, access control, and incident response, among others, all supporting NIST and ISO/IEC standards. Each template includes sections for purpose, scope, roles, procedures, records, and effectiveness monitoring. These templates aim to establish a comprehensive framework for managing security and compliance within an organization.

Uploaded by

Louie Mok
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views6 pages

CGRC Templates - Cyvitrix Learning

The document outlines various policy templates related to information security, risk management, asset classification, access control, and incident response, among others, all supporting NIST and ISO/IEC standards. Each template includes sections for purpose, scope, roles, procedures, records, and effectiveness monitoring. These templates aim to establish a comprehensive framework for managing security and compliance within an organization.

Uploaded by

Louie Mok
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd

Template Description

Information Security Policy Establishes the overarching security direction, principles, and
Template expectations for the organization, supporting NIST and ISO/IEC
requirements.

Risk Management Policy & Risk Defines the risk management approach and provides a structured register
Register Template for identifying, assessing, and tracking risks as required by NIST SP 800-37
and ISO/IEC 27001.

Asset Inventory & Classification Ensures all information assets are identified, classified, and managed in
Template accordance with NIST and ISO/IEC requirements.

Access Control Policy & User Access Defines access management principles and provides a checklist for
Review Checklist periodic user access reviews, supporting NIST AC controls and ISO/IEC
27001 Annex A.9.

Supplier Security Policy & Supplier Establishes requirements for managing supplier risks and provides a
List Template template for maintaining an approved supplier list, supporting NIST and
ISO/IEC 27001 A.15.

System Authorization & Security Documents the process for system authorization and ongoing security
Assessment Plan Template assessments, as required by NIST SP 800-37 and 800-53.

Continuous Monitoring Plan Defines the approach for ongoing monitoring of controls and risks,
Template supporting NIST SP 800-137 and ISO/IEC 27001 clause 9.
Incident Response Policy & Incident Establishes procedures for responding to security incidents and provides
Log Template a log template for evidence collection, supporting NIST IR controls and
ISO/IEC 27001 A.16.

Change Management Policy & Documents the process for managing changes to systems and controls,
Change Log Template ensuring traceability and compliance with NIST and ISO/IEC
requirements.

Training & Awareness Policy Defines requirements for security training and awareness, supporting
Template NIST AT controls and ISO/IEC 27001 clause 7.2.

Audit & Compliance Monitoring Outlines the approach for internal audits and compliance monitoring,
Policy Template supporting NIST and ISO/IEC 27001 clause 9.2.

Data Classification & Handling Policy Defines data classification levels and handling requirements, supporting
Template NIST and ISO/IEC 27001 A.8.

Vulnerability Management Policy & Documents the process for identifying, assessing, and remediating
Remediation Log Template vulnerabilities, supporting NIST RA and SI controls.

Backup & Recovery Policy Template Defines backup and recovery requirements to ensure data availability and
integrity, supporting NIST CP controls and ISO/IEC 27001 A.17.
Physical Security Policy Template Addresses physical security controls, even if out of scope for some
environments; includes placeholders where not applicable.

Document Control & Retention Establishes requirements for document management, versioning, and
Policy Template retention, supporting ISO/IEC 27001 clause 7.5.

Privacy & Data Protection Policy Defines privacy and data protection requirements, supporting NIST and
Template ISO/IEC 27701 where applicable.

Change Management Policy & Ensures changes to systems and processes are controlled and
Change Request Form documented, supporting NIST and ISO/IEC 27001 A.12.1.2.

Audit & Compliance Review Policy & Defines the process for conducting internal audits and compliance
Audit Checklist reviews, supporting NIST and ISO/IEC 27001 clause 9.2.

Business Continuity & Disaster Documents the approach to business continuity and disaster recovery,
Recovery Policy supporting NIST SP 800-34 and ISO/IEC 27001 A.17.
When to Use Sections (H1s)
Use when establishes the overarching security Information Security Policy • Purpose • Scope • Roles
direction, principles, and expectations for the & Responsibilities • Procedure / Method • Records &
organization, supporting NIST and ISO/IEC Evidence (forms/logs to keep) • KPIs & Effectiveness
requirements. Monitoring • References • Document Control

Use when defines the risk management approach and Risk Management Policy • Purpose • Scope • Roles &
provides a structured register for identifying, Responsibilities • Procedure / Method • Records &
assessing, and tracking risks as required by NIST SP Evidence (forms/logs to keep) • KPIs & Effectiveness
800-37 and ISO/IEC 27001. Monitoring • References • Document Control • Risk
Register Example

Use when ensures all information assets are Asset Inventory & Classification Policy • Purpose •
identified, classified, and managed in accordance with Scope • Roles & Responsibilities • Procedure / Method
NIST and ISO/IEC requirements. • Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control • Asset Inventory Example

Use when defines access management principles and Access Control Policy • Purpose • Scope • Roles &
provides a checklist for periodic user access reviews, Responsibilities • Procedure / Method • Records &
supporting NIST AC controls and ISO/IEC 27001 Annex Evidence (forms/logs to keep) • KPIs & Effectiveness
A.9. Monitoring • References • Document Control • User
Access Review Checklist

Use when establishes requirements for managing Supplier Security Policy • Purpose • Scope • Roles &
supplier risks and provides a template for maintaining Responsibilities • Procedure / Method • Records &
an approved supplier list, supporting NIST and Evidence (forms/logs to keep) • KPIs & Effectiveness
ISO/IEC 27001 A.15. Monitoring • References • Document Control •
Supplier List Example

Use when documents the process for system System Authorization & Security Assessment Plan •
authorization and ongoing security assessments, as Purpose • Scope • Roles & Responsibilities •
required by NIST SP 800-37 and 800-53. Procedure / Method • Records & Evidence (forms/logs
to keep) • KPIs & Effectiveness Monitoring •
References • Document Control

Use when defines the approach for ongoing Continuous Monitoring Plan • Purpose • Scope •
monitoring of controls and risks, supporting NIST SP Roles & Responsibilities • Procedure / Method •
800-137 and ISO/IEC 27001 clause 9. Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control
Use when establishes procedures for responding to Incident Response Policy • Purpose • Scope • Roles &
security incidents and provides a log template for Responsibilities • Procedure / Method • Records &
evidence collection, supporting NIST IR controls and Evidence (forms/logs to keep) • KPIs & Effectiveness
ISO/IEC 27001 A.16. Monitoring • References • Document Control •
Incident Log Example

Use when documents the process for managing Change Management Policy • Purpose • Scope •
changes to systems and controls, ensuring traceability Roles & Responsibilities • Procedure / Method •
and compliance with NIST and ISO/IEC requirements. Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control • Change Log Example

Use when defines requirements for security training Training & Awareness Policy • Purpose • Scope •
and awareness, supporting NIST AT controls and Roles & Responsibilities • Procedure / Method •
ISO/IEC 27001 clause 7.2. Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control

Use when outlines the approach for internal audits Audit & Compliance Monitoring Policy • Purpose •
and compliance monitoring, supporting NIST and Scope • Roles & Responsibilities • Procedure / Method
ISO/IEC 27001 clause 9.2. • Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control

Use when defines data classification levels and Data Classification & Handling Policy • Purpose •
handling requirements, supporting NIST and ISO/IEC Scope • Roles & Responsibilities • Procedure / Method
27001 A.8. • Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control

Use when documents the process for identifying, Vulnerability Management Policy • Purpose • Scope •
assessing, and remediating vulnerabilities, supporting Roles & Responsibilities • Procedure / Method •
NIST RA and SI controls. Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control • Remediation Log Example

Use when defines backup and recovery requirements Backup & Recovery Policy • Purpose • Scope • Roles
to ensure data availability and integrity, supporting & Responsibilities • Procedure / Method • Records &
NIST CP controls and ISO/IEC 27001 A.17. Evidence (forms/logs to keep) • KPIs & Effectiveness
Monitoring • References • Document Control
Use when addresses physical security controls, even if Physical Security Policy • Purpose • Scope • Roles &
out of scope for some environments; includes Responsibilities • Procedure / Method • Records &
placeholders where not applicable. Evidence (forms/logs to keep) • KPIs & Effectiveness
Monitoring • References • Document Control

Use when establishes requirements for document Document Control & Retention Policy • Purpose •
management, versioning, and retention, supporting Scope • Roles & Responsibilities • Procedure / Method
ISO/IEC 27001 clause 7.5. • Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control

Use when defines privacy and data protection Privacy & Data Protection Policy • Purpose • Scope •
requirements, supporting NIST and ISO/IEC 27701 Roles & Responsibilities • Procedure / Method •
where applicable. Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control

Use when ensures changes to systems and processes Change Management Policy • Purpose • Scope •
are controlled and documented, supporting NIST and Roles & Responsibilities • Procedure / Method •
ISO/IEC 27001 A.12.1.2. Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control • Change Request Form Example

Use when defines the process for conducting internal Audit & Compliance Review Policy • Purpose • Scope •
audits and compliance reviews, supporting NIST and Roles & Responsibilities • Procedure / Method •
ISO/IEC 27001 clause 9.2. Records & Evidence (forms/logs to keep) • KPIs &
Effectiveness Monitoring • References • Document
Control • Audit Checklist Example

Use when documents the approach to business Business Continuity & Disaster Recovery Policy •
continuity and disaster recovery, supporting NIST SP Purpose • Scope • Roles & Responsibilities •
800-34 and ISO/IEC 27001 A.17. Procedure / Method • Records & Evidence (forms/logs
to keep) • KPIs & Effectiveness Monitoring •
References • Document Control

You might also like