Securitydox customizable policies and procedures templates align with security best-practices and are based on NIST 800-53 (v4). Templates are provided in Word format for easy editing.
| Document | NIST 800-53 Controls | |
|---|---|---|
| (AC 1-8 11 14 22) Logical Access Controls Policy & Procedures | AC 1, 2, 3, 4, 5, 6, 7, 8, 11, 14, 11 | Sample |
| (AC 17 18) Remote and Wireless Access Controls Policy & Procedures | AC 17, 18 | |
| (AC 19 20) Mobile Device Access Controls & External Systems Use Policy & Procedures | AC 19, 20 | |
| (AU 1-6 8-9 11-12) Audit and Accountability Policy & Procedures | AU 1, 2, 3, 4, 5, 6, 8, 9, 11, 12 | Sample |
| (AT 1 2) Security Awareness and Training Policy & Procedures | AT 1, 2 | Sample |
| (CM 1-11) Configuration Management Policy & Procedures | CM 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 | |
| (CP 1-10) Contingency Planning Policy & Procedures | CP 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 | |
| (IA 1-8) Identification and Authentication Policy & Procedures | IA 1, 2, 3, 4, 5, 6, 7, 8 | |
| (IR 1-8) IT Incident Response Policy & Procedures | IR 1, 2, 3, 4, 5, 6, 7, 8 | |
| (MP 1-7) Media Protection Policy & Procedures | MP 1, 2, 3, 4, 5, 6, 7 | |
| (PS 1-8) IT Personnel Security Policy & Procedures | PS 1, 2, 3, 4, 5, 6, 7, 8 | |
| (PE 1-18) Physical and Environmental Protection Policy & Procedures | PE 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18 | |
| (RA 1-5) IT Risk Assessment Policy & Procedures | RA 1, 2, 3, 4, 5 | |
| (CA 1-3 5-9) IT Security Assessment and Authorization Policy & Procedures | CA 1, 2, 3, 5, 6, 7, 8, 9 | |
| (SC 1-5 7 14 15 20-22 39) IT System and Communications Protection Policy & Procedures | SC 1, 2, 3, 4, 5, 7, 14, 15, 20, 21, 22, 39 | |
| (SC 8 9 12 13 17 23 28) IT System and Communications Encryption Policy & Procedures | SC 8, 9, 12, 13, 17, 23, 28 | |
| (SI 1-5 8-10 12) IT System and Information Integrity Policy & Procedures | SI 1, 2, 3, 4, 5, 8, 9, 10, 12 | |
| (SA 1-11) IT System and Services Acquisition Policy & Procedures | SA 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11 | |
| (MA 1 2 4 5) IT System Maintenance Policy & Procedures | MA 1, 2, 4, 5 | |
| (PL 1-4 6) IT System Security Planning Policy & Procedures | PL 1, 2, 3, 4, 6 | |
| Security Policies and Procedures Document Register | ||
| IT Glossary |
For questions, to purchase our templates, or to get more information (e.g. pricing) Click here.