policy map
TRANSCRIPT
![Page 1: Policy Map](https://reader036.vdocument.in/reader036/viewer/2022092700/586e720f1a28ab99598b4f79/html5/thumbnails/1.jpg)
IT Risk Management Policy
Technology Usage Policy
Proposed IT Risk Management Portfolio of Security Documents
Web and Client/Server Application
Development Security Standard
Web Server Security Standard
Database Security Standard
Web Services Security Standard
Application Security
StandardsInformation
Classification Standard
Personal Information Protection StandardAsset Inventory
Controls Standard IT Contracting
Standard
Security Management Standards
Malicious Code Prevention Standard
User Access Management
Standard
Vulnerability Management
Standard
Security Event Management
Standard
Change Promotion Standard
Media Retention & Destruction
Standard
Physical & Environmental
Controls Standard
Operations Security Standards
Firewall Security Standard
Router/Switch Security Standard
Voice/PBX Standard
Wireless Security Standard
Remote Control Standard
Network Perimeter Security Standard
General Network Security Standard
Network
Workstation Security Standard
Email & Instant Messaging Security
Standard
Cryptographic Standard
Infrastructure Services Standards
Unix/Linux Security Standard
Windows X Security Standard
Operating Systems
Remote Access Standard
Incident Response Standard
Security Acknowledgement Banner Standard
Separation of Duties Standard
Outside Service Provider (OSP)
Standard