|
Use this template to build and manage your agency’s security policy lifecycle.
|
|
|
Use this template as a means to request and approve proposed exceptions to your security policies.
|
|
|
This tool will help you determine governance and management accountabilities and responsibilities and use them to build a visual governance and management model.
|
|
|
Use this tool to help you track ongoing exceptions to your security policies.
|
|
|
Use this workflow to help you formalize and document your policy exception approval process.
|
|
|
This monthly recording covers topics such as cyberthreat trends, nation states, cybercriminal and hacktivist campaigns, data breaches, control strategies, and exposure to...
|
|
|
Use this tool to conduct a comprehensive assessment of your IAM program and develop a roadmap toward your target state.
|
|
|
Use this tool to document the roles and responsibilities associated with managing identities and access in your organization.
|
|
|
Use this tool to document the overall business, security, and privacy requirements related to your identity and access management program.
|
|
|
Use this research to improve the governance and operations of identity and access management at the organization. This blueprint uses the identity lifecycle as a framework...
|
|