Policy Library

Policy Source™ policies, developed and enhanced over a twenty-year span, have been vetted against numerous industries and are aligned with global cyber security frameworks and evolving industry best practices.

Whether you’re looking for standardized policies with your company logo that can be downloaded today, or customized policies designed to meet your organization’s specific requirements, our comprehensive policy library is where you should start.

Come straight to the source!

View Sample:
Acceptable Use Policy

The purpose of this policy is to provide the requirements for acceptable use of company technology, devices, and information resources.

Sections include: PERSONAL USAGE, BUSINESS PURPOSE USAGE, MONITORING, and ENFORCEMENT 

Acceptable Use Policy w/ Signature

The purpose of this policy is to provide the requirements for acceptable use of company technology, devices, and information resources.

Sections include: PERSONAL USAGE, BUSINESS PURPOSE USAGE, MONITORING, ENFORCEMENT, and ACKNOWLEDGEMENT

Access Control Policy

The purpose of this policy is to define organizational requirements for physical and logical access controls.

Sections include: ACCESS CONTROLS, PHYSICAL ACCESS CONTROLS, and USER ACCESS CONTROL 

Application Security Policy

The purpose of this policy is to define application security requirements for newly developed applications.

Sections include: APPLICATION DEVELOPMENT and CUSTOM CODE REVIEWS

Asset Management Policy

The purpose of this policy is to define organizational requirements for managing assets and inventory.

Sections include: ASSET MANAGEMENT, ASSET INVENTORY, and ASSET LIFECYCLE

Awareness & Training Policy

The purpose of this policy is to define organizational requirements for security awareness and training.

Sections include: AWARENESS AND TRAINING

Bring Your Own Device (BYOD) Policy

The purpose of this policy is to define Mobile Device Management (MDM) requirements for non-corporate provided devices (BYOD).

Sections include: MOBILE REQUIREMENTS, SECURITY, SUPPORT, LOST / STOLEN DEVICES, and RISKS / LIABILITIES / DISCLAIMERS

Business Continuity Disaster Recovery Policy

The purpose of this policy is to define organizational requirements for business continuity and information technology disaster recovery.

Sections include: GOVERNANCE, PLANNING, and TESTING

Change Management Policy

The purpose of this policy is to define change management requirements.

Sections Include: CHANGE REQUIREMENTS, DOCUMENTATION, REVIEW AND APPROVAL, and IMPLEMENTATION

Clean Desk Policy

The purpose of this policy is to define the requirements for maintaining a secure and clean desk.

Sections Include: WORKSPACE, END-USER COMPUTING DEVICES, STORAGE, and DATA DISPOSAL

Configuration Management Policy

The purpose of this policy is to define organizational requirements for maintaining system configurations.

Sections include: BASELINE CONFIGURATIONS, CHANGE MANAGEMENT, and CONFIGURATION SETTINGS

Data Backup Policy

The purpose of this policy is to define organizational requirements for data backups.

Sections include: DATA BACKUP, OFF-SITE BACKUPS, and RETENTION

Data Classification Policy

The purpose of this policy is to define organizational requirements for data classification.

Sections include: DATA CLASSIFICATION, PUBLIC DATA, INTERAL-USE DATA, CONFIDENTIAL DATA, and RESTRICTED DATA 

Data Handling Policy

The purpose of this policy is to define organizational requirements for data handling.

Sections include: DATA HANDLING

Electronic Media & Physical Asset Disposal Policy

The purpose of this policy is to define organizational requirements for disposing of electronic media and physical technology assets.

Section include: TECHNOLOGY EQUIPMENT DISPOSAL, and SALE OR TRANSFER OF TECHNOLOGY ASSETS

Email Policy

The purpose of this policy is to define the requirements for the proper use of company email accounts.

Section include: EMAIL USAGE, BACKUP AND RETENTION, and COMPLIANCE

Encryption Policy

The purpose of this policy is to define organizational requirements for encryption.

Sections include: ENCRYPTION METHODS, ENCRYPTION REQUIREMENTS, KEY AGREEMENT AND AUTHENTICATION, ALGORITHM, KEY ACCESS MANAGEMENT, and KEY GENERATION AND STORAGE

End-User Computing Policy

The purpose of this policy is to define requirements for the use of <Company Name> managed end-user computing devices.

Sections include: END-USER DEVICES, CONNECTION, and DEVICE LIFECYCLE

Human Resource Security Policy

The purpose of this policy is to define organizational human resource security requirements.

Sections include: SCREENING, EMPLOYMENT TERMS AND CONDITIONS, TRAINING AND AWARENESS, DISCIPLINARY PROCESS, and TERMINATION OR CHANGE OF ROLE

Identification and Authentication Policy

The purpose of this policy is to define organizational requirements for identifiers and authentication methods.

Sections include: IDENTIFIERS, AUTHENTICATION, and PKI-BASED AUTHENTICATION

Incident Management Policy

The purpose of this policy is to define organizational requirements for information security incident management.

Sections include: INFORMATION SECURITY INCIDENT, and TRAINING

Information Security Policy

The purpose of this policy is to define organizational requirements for Information Security.

Sections include: SECURITY TRAINING AND AWARENESS, IT SYSTEMS, SOFTWARE, DEVICES, SECURITY RISK REVIEW, and SECURITY INCIDENT MANAGEMENT

Internet Use Policy

The purpose of this policy is to define the requirements for the appropriate utilization of company provided internet access.

Sections include: ALLOWED USAGE, PROHIBITED USAGE, and MONITORING

Logging and Monitoring Policy

The purpose of this policy is to define requirements for logging and monitoring to detect security events.

Sections include: LOG CONFIGURATION, LOG INTEGRITY, and LOG MONITORING

Media Policy

The purpose of this policy is to define organizational requirements for disposing of media.

Sections include: MANAGEMENT OF MEDIA, MEDIA DISPOSAL, and SALE OR TRANSFER OF MEDIA

Mobile Device Management Policy

The purpose of this policy is to define Mobile Device Management (MDM) requirements for company provided mobile devices.

Sections include: PROCUREMENT AND SETUP, MOBILE DEVICE USAGE, SECURITY, and DEVICE LIFECYCLE

Network Security Policy

The purpose of this policy is to define organizational requirements for securing and configuring company networks.

Sections include: NETWORK SECURITY CONTROLS, NETWORK SEGMENTATION, ELECTRONIC MESSAGING, NETWORK SECURITY CONFIGURATION, NETWORK CONFIGURATIONS, and CHANGE MANAGEMENT

Password Policy

The purpose of this policy is to define organizational requirements for passwords.

Sections include: PASSWORD and PASSWORD MANAGEMENT 

Patch Management Policy

The purpose of this policy is to define patching requirements for IT systems.

Sections include: PATCH REQUIREMENTS, PATCH REVIEW, and PATCH SCHEDULE 

Physical Security Policy

The purpose of this policy is to define physical security requirements for facilities, physical assets, and data centers.

Sections include: PHYSICAL SECURITY FOR FACILITIES and PHYSICAL SECURITY FOR DATA CENTERS

Quality Assurance and Testing Policy

The purpose of this policy is to define quality assurance and user acceptance testing requirements.

Sections include: QUALITY ASSURANCE and USER ACCEPTANCE TESTING

Records Retention Policy

The purpose of this policy is to define records retention requirements.

Sections include: RECORDS RETENTION AND DESTRUCTION, RECORDS ACCESS, and RECORDS STORAGE

Remote Access Policy

The purpose of this policy is to define organizational requirements for remote access.

Sections include: REMOTE ACCESS AUTHORIZATION, REMOTE ACCESS, REMOTE SESSION, and REMOTE ACCESS ACCOUNT DEACTIVATION REQUIREMENTS

Risk Management Policy

The purpose of this policy is to define risk management requirements..

Sections include: RISK MANAGEMENT, RISK IDENTIFICATION, RISK ASSESSMENT, RISK RESPONSE, and RISK MONITORING

Security Assessment Policy

The purpose of this policy is to define requirements for assessing security controls.

Sections include: SECURITY ASSESSMENT and SECURITY CONTROL MONITORING

Software Development Life Cycle Policy

The purpose of this policy is to define organizational requirements for software development lifecycle (SDLC) requirements.

Sections include: SECURE SOFTWARE DEVELOPMENT LIFECYCLE, CHANGES, and TESTING

System & Information Integrity Policy

The purpose of this policy is to define system and information integrity requirements.

Sections include: SYSTEM AND INFORMATION INTEGRITY, SCANNING, and PROTECTION

Third Party Management Policy

The purpose of this policy is to define organizational requirements for third party management.

Sections include: ONBOARDING, MAINTENANCE, and OFF-BOARDING

Video Surveillance Policy

The purpose of this policy is to define video surveillance requirements.

Sections include: VIDEO SURVEILLANCE REQUIREMENTS and USE OF VIDEO SURVEILLANCE ON PROPERTIES

Vulnerability Management Policy

The purpose of this policy is to define vulnerability management requirements.

Sections include: VULNERABILITY ASSESSMENT, VULNERABILITY REVIEW, and VULNERABILITY REMEDIATION