Cyber Defense Mega Pack

Cyber Defense Mega Pack

Cyber Defense Mega Pack

Regular price $1,796.00
/
  • Start Now With Instant Download
  • One Time Payment
  • Unlimited Email and Chat Support

ISO 27001:2022 Implementation Toolkit

ISMS Policies
1. Acceptable Use Policy
2. Access Control Policy
3. Asset and Information Management
4. Asset Management Policy
5. Business Continuity Plan
6. BYOD Policy
7. BYOD User Acknowledgement And Agreement
8. Capacity Management Policy
9. Clean Desk Standard Policy
10. Cloud Computing Policy
11. Communication Procedure
12. Cryptographic Controls Policy
13. Data Backup And Recovery Policy
14. Data Protection and Privacy Policy
15. Data Transfer Agreement
16. Disaster And Recovery Plan
17. Disposal And Destruction Policy
18. Document and Record Control Procedure
19. Human Resource Security Policy
20. Information Asset Register
21. Information Classification Policy
22. Information Transfer Policy
23. ISMS Manual
24. ISMS Policy
25. Mobile And Devices Teleworking Policy
26. Monitoring And Logging Policy
27. Monitoring And Measuring Policy
28. Networks Security Design
29. Password Policy
30. Patch Management And System Updates Policy
31. Physical Protection Policy
32. Project Management Policy
33. Protection Against Malware Policy
34. Remote Working Policy
35. Roles and Responsibilities in ISMS
36. Secure System Architecture and Engineering Principles
37. Security Roadmap
38. Server Patch Management Checklist
39. Threat Intelligent Policy
40. Threat Management Policy

Internal Audit
41. Annual Internal Audit Program
42. Audit Calendar
43. Audit Non Conformity Report
44. Internal Audit Checklist Excel
45. Internal Audit Dashboard
46. Internal Audit Plan
47. Internal Audit Procedure
48. Internal Audit Process
49. Internal Audit Report
50. Non Conformity And Corrective Action Procedure

Risk Management
51. RASCI Matrix
52. Information Security Risk Register

Incident Management
53. Incident Log
54. Incident Management Procedure
55. Incident Report
56. Security Incident Management Process
57. Vulnerability Management Process Flow Chart
58. Vulnerability Management Tracking Spreadsheet

Management Review
59. Management Review Agenda
60. Management Review Minutes of Meeting

Change Management
61. Change Control Form
62. Change Management Policy
63. Change Management Process Checklist
64. Change Request Form
65. Change Request Log

Implementation and Planning
66. Excel Implementation Plan
67. Project Plan (27001)
68. Transition Pack
69.ISO 27001 Implementation Process Document

Mandatory Documents
70. Agreements, NDAs, and Specifying Responsibilities in each Security Policy and Procedure
71. Information Security Policy
72. Internal Audit Status Report
73. ISMS Scope Document
74. IT Asset Register
75. Legal Regulatory Contractual Requirements Policy
76. Risk Management Procedure
77. Risk Treatment Plan
78. Secure Development Policy
79. Statement Of Applicability

SOC 2 Implementation Toolkit

1. Acceptable Use Policy
2. Access Management Policy
3. Anti-Malware Policy
4. Asset Management Policy
5. Business Continuity Plan
6. Configuration and Change Management Policy
7. Data Protection Policy
8. Disaster Recovery Plan
9. Encryption Policy
10. Human Resource Security Policy
11. Incident Response Plan
12. Incident Management Policy
13. Information Security Policy
14. Logging and Monitoring Policy
15. Mobile Device Policy
16. Network Security Policy
17. Physical Security Policy
18. Remote Access Policy
19. Risk Management Policy
20. SOC 2 Controls List
21. SOC 2 High Level Checklist
22. SOC 2 Implementation Plan
23. SOC 2 Process Flow
24. SOC 2 Project Plan
25. SOC 2 Project Status
26. Software Development Policy
27. Supplier Security Policy
28. Vulnerability Management Policy

NIST CSF 2.0 Implementation Toolkit

1. Acceptable Use Policy
2. Access and Account Management Policy
3. Asset Disposal and Sanitization Policy
4. Business Continuity Plan with Office Operation
5. Business Continuity Plan for remote only operation
6. Change and Patch Management Policy
7. Data Encryption Policy
8. Data Retention and Destruction Policy
9. Disaster Recovery Plan
10. Governance, Risk, And Compliance Management Policy
11. HR Security Policy
12. Incident Response Plan
13. Information Security Management Program
14. Information Security Policy
15. Information Security Risk Management Framework
16. Mobile Device Management and Remote Access Policy
17. NIST CSF Excel Implementation
18. NIST CSF Excel Project Checklist
19. NIST CSF Internal Audit Status Report
20. NIST CSF Management Review Agenda
21. Personal Data Protection Policy
22. Physical Security Policy
23. Risk Assessment tool NIST CSF MAPPINGS
24. Secure Configuration and System Hardening Policy
25. Secure Software Development Life Cycle
26. Security Audit and Monitoring Policy
27. Security Awareness Training Policy
28. Systems and Network Security Policy
29. Third-Party Security Management Policy
30. Third-Party Security Management Procedure
31. Third-party Information Security Risk Assessment Questionnaire
32. Vulnerability Management Policy

DORA Compliance Framework

1. DORA Implementation Plan
2. DORA Checklist
3. DORA Project Plan
4. DORA Slides
5. DORA Testing Framework
6. ICT Backup and Restoration Procedures
7. ICT Business Continuity Plan
8. ICT Crisis Communication Plan
9. ICT Data Protection and Confidentiality Policy
10. ICT Information Security Policy
11. ICT Information Sharing
12. ICT Related Incident Management Reporting Policy 
13. ICT Risk Management Framework
14. ICT Third Party Risk Management Standard

Welcome to ISO Docs. Our priority at ISO Docs is to provide high-quality templates and help our customers be efficient. Our goal is to create quality templates so that our customers can avoid rework and focus on their actual jobs rather than doing everything from scratch. We have dedicated support ready to assist you in any way we can.

YES, our store is powered by Shopify which is one of the most trusted e-commerce platforms. Shopify is certified Level 1 PCI DSS compliant. All Shopify stores include an SSL certificate that uses industry standard 256-bit encryption technology. This is the same level of encryption used by large banks to keep your information secure.  

2. Will I get support if I have an issue or a query?

Definitely, yes, we have a dedicated support team who will happily assist. It can be an issue or any help with our templates. Our support policy is to address the customer query ASAP regardless of the product they purchase.  

3. Is this a one time payment or monthly membership?

All our products are ONE TIME PAYMENT. We do not offer subscriptions so whatever you pay will be be one time.  

4. How do I access my downloads?

After you checkout, you will be taken to a download page. You will also get a download link in your email.

5. What if the download link does not work?

Sometimes links can be blocked by a corporate firewall so please try using the link from a different network or from home. If you still cannot access drop an email to support@iso-docs.com and use our Contact Us Page.  

6. Do you provide refunds?

We will REFUND the full amount in the following scenarios - 

  1. Templates don't work as described, and we cannot fix your problem in a reasonable time. 
  2. Templates are missing from your download and we cannot provide you the same templates shown on the site.
  3. You are not able to access the download. We will try to provide different mediums but if none of them work for you then we will refund your amount. Check our Refund Policy.  

What are the different types of payments accepted?

We accept PayPal, Apple Pay, Google Pay, Master Card , Amex and VISA. 

8. Do these templates work with Excel?

Yes, the templates are built using MS Office so will work on Excel.

9. Can the templates be customized or edited?

Yes, our templates can be edited and changed as you need. But reselling of templates is not allowed.

10. Why do you have a logo on the documents?

The ITIL Docs logo is only visible on the template images. We do not use logos on templates so you can customize the template as needed.

11. How will I get my FREE monthly updates?

We will send download links to your email in the first few days of the month. We will send it to the email provided when making the purchase.

This site is protected by hCaptcha and the hCaptcha Privacy Policy and Terms of Service apply.

You may also likeISO Templates and Documents Download
Recently viewed