SlideShare a Scribd company logo
1 of 1
Download to read offline
SecurityPoliciesOnline.com
Choose one, a handful, or even all of them - it’s the flexibility of
offering comprehensive documentation that keeps customers
coming back for more. No need to purchase an entire set of
policies or procedures if all that’s needed is a specific form, template
or checklist from our vast and growing list of documents currently
offered.
Because we focus on the broader needs of today’s demanding and
complex business models, securitypoliciesonline.com offers an
almost endless array of high-quality, professionally developed
policies, procedures, forms, checklists, templates, provisioning and
hardening documents - and much more.Why not have the flexibility
and options to choose exactly the documentation you need, no more,
no less? With securitypoliciesonline.com, you can!
Securitypoliciesonline.com Offers Hundreds of Various Operational,Business Specific
and Information Security Policies and Procedures for Immediate Download.
• Download Only the Documents You Need!
• Hundreds of Security Templates to Pick and Choose From
• Thousands of pages of Professionally Developed Security Material
• Developed in Accordance with Global Security Benchmarks, Standards & Frameworks
Available for Instant
Download,no Delay!
Hundreds of Pages of
Provisioning and Hardening
Checklists Included
Hundreds of High Quality
Information Security
Templates
Thousands of Pages of
Professionally Developed
Security Material
Vital for HIPAA, NIST,
FISMA, Safe Harbor, SOX,
PCI DSS Compliance
A Must-Have
for I.T. and
Compliance Auditors
Additional Information:
Access this computer from network– Administrators, Authenticated Users,
Enterprise Domain Controllers
Add workstations to domain – Administrators
Adjust memory quotas for a process – Administrators, Local Service, Network
Service
Allow log on locally – Administrators, Backup Operators
Allow log on through Terminal Services– Administrators
Backup files and directories – Administrators, Backup Operators
Bypass traverse checking – Authenticated Users
Change the system time – Administrators, Local Service
Create a pagefile – Administrators
Create a token object – (None)
Create global objects – Administrators, Service
Create permanent shared objects – (None)
Deny logon as a batch job– Guests, Support_388945a0
Deny logon as a service – (None)
Deny logon locally – Guests, Support_388945a0
Deny logon through Terminal Services– Guests, Users
Enable computer and user accounts to be trusted for delegation–
Administrators
Force shutdown from a remote system– Administrators
Generate security audits – Local Service, Network Service
Impersonate a client after authentication – Administrators, Service
Increase scheduling priority – Administrators
Load and unload device drivers – Administrators
Lock pages in memory – (None)
Log on as a batch job – (None)
Log on as a service – Network Service
Manage auditing and security log – Administrators Group (Exchange Enterprise
Servers Group on Domain Controllers and Exchange Servers)
Modify firmware environment values – Administrators
Perform volume maintenance tasks – Administrators
Profile single process – Administrators
Profile system performance – Administrators
Remove computer from docking station – Administrators
Replace a process level token – Local Service, Network Service
Restore files and directories – Administrators, Backup Operators
Shut down the system – Administrators
Take ownership of files or other objects– Administrators
(3).
Task
Minimum, and Maximum Password Age, Password Length/Complexity, and
Password Uniqueness settings should comply with organizational or regulatory
standards.
Additional Information:
Networking Security
(1).
Task
All unnecessary services and protocols should be disabled.
Additionally, please note that when referring to disposal procedures in the context of backups, this
specifically applies to the physical devices used for storing such data, and not the actual data itself.
Policies regarding disposal of data – the actual information – are also outlined in the [company name]
Data Retention and Disposal Policy. Thus, for purposes of disposal for the actual physical devices used
for storing such data, they consist of the following:
• Disintegration
• Shredding (disk grinding device)
• Incineration by a licensed incinerator
• Pulverization
Please note that prior to physically destroying any of the actual devices used for storing data, all data must
be electronically removed (i.e., wiped, formatted, etc.) as the primary layer of security before being
destroyed.
Backup Recovery Abilities
On a regular basis, such as quarterly, and no less than twice a year, authorized personnel are to examine,
and report on the ability to effectively restore and recover data in the event of such a request. This
required examining the facility for which data is being stored for ensuring its overall safety and security.
Furthermore, all backup mediums, such as tapes, disks, and other supporting hardware and software
utilities, are to be examined for ensuring proper function. Such information and all relevant findings are
to be reported upstream to management, with recommendations for improving upon or correcting any
issues or concerns.
Business Continuity and Disaster Recovery Planning (BCDR)
Documented Business Continuity and Disaster Recovery Planning (BCDRP) is vital to protecting all
[company name] assets along with ensuring rapid resumption of critical services in a timely manner.
Because disasters and business interruptions are extremely difficult to predict, it is the responsibility of
authorized [company name] personnel to have in place a fully functioning BCDRP process, and one that
also includes specific policies, procedures, and supporting initiatives relating to the safety and security of
backups, and supporting systems for which to restore backup data on.
Continuous Monitoring of Backup Environment
It’s also vitally important to undertake continuous monitoring practices over the entire backup
environment for ensuring its confidentiality, integrity, and availability (CIA). As such, authorized
personnel are to ensure the following:
• All applicable environments requiring backups have been readily identified.
• The backup types (full, differential, and incremental) along with the default backups scheduling,
is commensurate with the needs of [company name].
• Backup results are being sent to, reviewed, and assessed by authorized personnel.
• All backup infrastructure – both hardware and software – related are performing and function as
expected, with no exceptions or deviations regarding performance, accuracy, and other critical
measures deemed relevant. Infrastructure, includes, but is not limited to, the following:
Backup Retention Periods and Disposal
[Note: The "Policy" section within this document simply states general best-of-breed practices that should
be in place regarding backup retention periods and disposal. Thus, please use the "Procedures" section to
actually describe various specifics pertaining to backup retention periods and disposal, such as what the
specific retention periods are, for what data, and what specific disposal procedures are used for securely
deleting and destroying data and the physical backup devices.
Additional Information
General Notes | Comments:
Backup Recovery Abilities
[Note: The "Policy" section within this document simply states general best-of-breed practices that should
be in place regarding backup recovery abilities. Thus, please use the "Procedures" section to actually
describe various specifics pertaining to backup recovery abilities, such as what specific procedures are
undertaken on a regular basis for ensuring backup recovery initiatives are in place, working, etc.
Additional Information
General Notes | Comments:
Business Continuity and Disaster Recovery Planning (BCDRP)
[Note: The "Policy" section within this document simply states general best-of-breed practices that should
be in place regarding BCDRP. Thus, please use the "Procedures" section to actually describe various
specifics pertaining to BCDRP, such as what specific provisions are included within the BCDRP
framework for backups.
Additional Information
General Notes | Comments:
Continuous Monitoring of Backup Environment
[Note: The "Policy" section within this document simply states general best-of-breed practices that should
be in place regarding continuous monitoring of the backup environment. Thus, please use the
"Procedures" section to actually describe various specifics pertaining to continuous monitoring of the
backup environment, such as what is specific practices are undertaken on a regular basis for ensuring it’s
operating as designed, etc.
1.0 Overview
In accordance with mandated organizational security requirements set forth and approved by
management, [company name] has established a formal Data Backup and Recovery policy and supporting
procedures. This policy is to be implemented immediately along with all relevant and applicable
procedures. Additionally, this policy is to be evaluated on a(n) [annual, semi-annual, quarterly] basis for
ensuring its adequacy and relevancy regarding [company name]'s needs and goals.
1.0 Purpose
This policy and supporting procedures are designed to provide [company name] with a documented and
formalized Data Backup and Recovery policy that is to be adhered to and utilized throughout the
organization at all times. Compliance with the stated policy and supporting procedures helps ensure the
safety and security of [company name] I.T. system resources and all supporting assets. Backups are a
critical process for any organization, especially considering today’s growing regulatory compliance
mandates and the ever-increasing cyber security threats for which business face on a daily basis. Yet
even without compliance mandates, a well-though out, efficient, and reliable backup and recovery is a
must for ensuring the confidentiality, integrity, and availability (CIA) of critical data.
1.0 Scope
This policy and supporting procedures encompasses all system resources and supporting assets that are
owned, operated, maintained, and controlled by [company name] and all other system resources, both
internally and externally, that interact with these systems.
• Internal system resources are those owned, operated, maintained, and controlled by [company
name] and include all network devices (firewalls, routers, switches, load balancers, other network
devices), servers (and the operating systems and applications that reside on them, both physical
and virtual servers) and any other system resources and supporting assets deemed in scope.
• External system resources are those owned, operated, maintained, and controlled by any entity
other than [company name], but for which these very resources may impact the confidentiality,
integrity, and availability (CIA) of [company name] system resources and supporting assets.
1.0 Policy
[Company name] is to ensure that the Data Backup and Recovery policy adheres to the following
conditions for purposes of complying with the mandated organizational security requirements set forth
and approved by management:
Backup environments
A critical component of any data backup and recovery initiatives is to properly identify all environments –
and the associated data – that required backup procedures. While critical environments, such as those
relating to production, development, and staging require backups, it’s the platforms and the supporting
systems within these environments that are to be identified, with applicable backup procedures in place.
This would include, but not limited to, the following platforms and supporting systems:
Authorization Form for User Access | New Employees
General User Information
User Name New Employee: (circle) YES NO
Last Name First Name Middle Name Social Security Number or Internal
Employee ID Number
Date of
Request
Office Address
Street Address City State ZIP Country
Have all the following applicable Human Resource new hire procedures been executed and fully completed prior to
granting access for the new user:
(1). Completed Application. Yes No N/A Date of Completion: Enter Date
(2). Reference and Background Checks. Yes No N/A Date of Completion: Enter Date
(3). Credit Check. Yes No N/A Date of Completion: Enter Date
(4). Criminal Background Check. Yes No N/A Date of Completion: Enter Date
(5). Drug Tests. Yes No N/A Date of Completion: Enter Date
(6). Assignment of company property. Yes No N/A Date of Completion: Enter Date
(7). Please list any other new hire procedures that were performed:
Please provide any additional comments and/or necessary informationregarding the applicable new hire procedures:
User Information
Type of User: Title Job Function Telephone Expiration Date (if
applicable)
Department Division Office Immediate Supervisor Secondary Supervisor
Please provide a general explanation and overview of why the specified user is being granted access to [company name] system resources:
List all applicable "identities" granted to new user: Business Justification & Reasoning:
(1). Username for accessing company-wide files system and for email, which
consists of first letter of first name, followed by complete spelling of last
name. Jdoe.
Necessary for performing duties as required .
(2). Granted access to trial production environment using the following
username: jdoeprod001.
Necessary for performing duties as required .
(3). Granted access to web portal for accessing client information using the
following username: john.doe001.
Necessary for performing duties as required .

More Related Content

Recently uploaded

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
daisycvs
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
Nauman Safdar
 

Recently uploaded (20)

Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
Chennai Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Av...
 
Arti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdfArti Languages Pre Seed Teaser Deck 2024.pdf
Arti Languages Pre Seed Teaser Deck 2024.pdf
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptxQSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
QSM Chap 10 Service Culture in Tourism and Hospitality Industry.pptx
 
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book nowKalyan Call Girl 98350*37198 Call Girls in Escort service book now
Kalyan Call Girl 98350*37198 Call Girls in Escort service book now
 
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NSCROSS CULTURAL NEGOTIATION BY PANMISEM NS
CROSS CULTURAL NEGOTIATION BY PANMISEM NS
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGParadip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Paradip CALL GIRL❤7091819311❤CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTSJAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR  ESCORTS
JAJPUR CALL GIRL ❤ 82729*64427❤ CALL GIRLS IN JAJPUR ESCORTS
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165Lucknow Housewife Escorts  by Sexy Bhabhi Service 8250092165
Lucknow Housewife Escorts by Sexy Bhabhi Service 8250092165
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book nowPARK STREET 💋 Call Girl 9827461493 Call Girls in  Escort service book now
PARK STREET 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 

Hundreds of Information Security Policies and Procedures | Download Now!

  • 1. SecurityPoliciesOnline.com Choose one, a handful, or even all of them - it’s the flexibility of offering comprehensive documentation that keeps customers coming back for more. No need to purchase an entire set of policies or procedures if all that’s needed is a specific form, template or checklist from our vast and growing list of documents currently offered. Because we focus on the broader needs of today’s demanding and complex business models, securitypoliciesonline.com offers an almost endless array of high-quality, professionally developed policies, procedures, forms, checklists, templates, provisioning and hardening documents - and much more.Why not have the flexibility and options to choose exactly the documentation you need, no more, no less? With securitypoliciesonline.com, you can! Securitypoliciesonline.com Offers Hundreds of Various Operational,Business Specific and Information Security Policies and Procedures for Immediate Download. • Download Only the Documents You Need! • Hundreds of Security Templates to Pick and Choose From • Thousands of pages of Professionally Developed Security Material • Developed in Accordance with Global Security Benchmarks, Standards & Frameworks Available for Instant Download,no Delay! Hundreds of Pages of Provisioning and Hardening Checklists Included Hundreds of High Quality Information Security Templates Thousands of Pages of Professionally Developed Security Material Vital for HIPAA, NIST, FISMA, Safe Harbor, SOX, PCI DSS Compliance A Must-Have for I.T. and Compliance Auditors Additional Information: Access this computer from network– Administrators, Authenticated Users, Enterprise Domain Controllers Add workstations to domain – Administrators Adjust memory quotas for a process – Administrators, Local Service, Network Service Allow log on locally – Administrators, Backup Operators Allow log on through Terminal Services– Administrators Backup files and directories – Administrators, Backup Operators Bypass traverse checking – Authenticated Users Change the system time – Administrators, Local Service Create a pagefile – Administrators Create a token object – (None) Create global objects – Administrators, Service Create permanent shared objects – (None) Deny logon as a batch job– Guests, Support_388945a0 Deny logon as a service – (None) Deny logon locally – Guests, Support_388945a0 Deny logon through Terminal Services– Guests, Users Enable computer and user accounts to be trusted for delegation– Administrators Force shutdown from a remote system– Administrators Generate security audits – Local Service, Network Service Impersonate a client after authentication – Administrators, Service Increase scheduling priority – Administrators Load and unload device drivers – Administrators Lock pages in memory – (None) Log on as a batch job – (None) Log on as a service – Network Service Manage auditing and security log – Administrators Group (Exchange Enterprise Servers Group on Domain Controllers and Exchange Servers) Modify firmware environment values – Administrators Perform volume maintenance tasks – Administrators Profile single process – Administrators Profile system performance – Administrators Remove computer from docking station – Administrators Replace a process level token – Local Service, Network Service Restore files and directories – Administrators, Backup Operators Shut down the system – Administrators Take ownership of files or other objects– Administrators (3). Task Minimum, and Maximum Password Age, Password Length/Complexity, and Password Uniqueness settings should comply with organizational or regulatory standards. Additional Information: Networking Security (1). Task All unnecessary services and protocols should be disabled. Additionally, please note that when referring to disposal procedures in the context of backups, this specifically applies to the physical devices used for storing such data, and not the actual data itself. Policies regarding disposal of data – the actual information – are also outlined in the [company name] Data Retention and Disposal Policy. Thus, for purposes of disposal for the actual physical devices used for storing such data, they consist of the following: • Disintegration • Shredding (disk grinding device) • Incineration by a licensed incinerator • Pulverization Please note that prior to physically destroying any of the actual devices used for storing data, all data must be electronically removed (i.e., wiped, formatted, etc.) as the primary layer of security before being destroyed. Backup Recovery Abilities On a regular basis, such as quarterly, and no less than twice a year, authorized personnel are to examine, and report on the ability to effectively restore and recover data in the event of such a request. This required examining the facility for which data is being stored for ensuring its overall safety and security. Furthermore, all backup mediums, such as tapes, disks, and other supporting hardware and software utilities, are to be examined for ensuring proper function. Such information and all relevant findings are to be reported upstream to management, with recommendations for improving upon or correcting any issues or concerns. Business Continuity and Disaster Recovery Planning (BCDR) Documented Business Continuity and Disaster Recovery Planning (BCDRP) is vital to protecting all [company name] assets along with ensuring rapid resumption of critical services in a timely manner. Because disasters and business interruptions are extremely difficult to predict, it is the responsibility of authorized [company name] personnel to have in place a fully functioning BCDRP process, and one that also includes specific policies, procedures, and supporting initiatives relating to the safety and security of backups, and supporting systems for which to restore backup data on. Continuous Monitoring of Backup Environment It’s also vitally important to undertake continuous monitoring practices over the entire backup environment for ensuring its confidentiality, integrity, and availability (CIA). As such, authorized personnel are to ensure the following: • All applicable environments requiring backups have been readily identified. • The backup types (full, differential, and incremental) along with the default backups scheduling, is commensurate with the needs of [company name]. • Backup results are being sent to, reviewed, and assessed by authorized personnel. • All backup infrastructure – both hardware and software – related are performing and function as expected, with no exceptions or deviations regarding performance, accuracy, and other critical measures deemed relevant. Infrastructure, includes, but is not limited to, the following: Backup Retention Periods and Disposal [Note: The "Policy" section within this document simply states general best-of-breed practices that should be in place regarding backup retention periods and disposal. Thus, please use the "Procedures" section to actually describe various specifics pertaining to backup retention periods and disposal, such as what the specific retention periods are, for what data, and what specific disposal procedures are used for securely deleting and destroying data and the physical backup devices. Additional Information General Notes | Comments: Backup Recovery Abilities [Note: The "Policy" section within this document simply states general best-of-breed practices that should be in place regarding backup recovery abilities. Thus, please use the "Procedures" section to actually describe various specifics pertaining to backup recovery abilities, such as what specific procedures are undertaken on a regular basis for ensuring backup recovery initiatives are in place, working, etc. Additional Information General Notes | Comments: Business Continuity and Disaster Recovery Planning (BCDRP) [Note: The "Policy" section within this document simply states general best-of-breed practices that should be in place regarding BCDRP. Thus, please use the "Procedures" section to actually describe various specifics pertaining to BCDRP, such as what specific provisions are included within the BCDRP framework for backups. Additional Information General Notes | Comments: Continuous Monitoring of Backup Environment [Note: The "Policy" section within this document simply states general best-of-breed practices that should be in place regarding continuous monitoring of the backup environment. Thus, please use the "Procedures" section to actually describe various specifics pertaining to continuous monitoring of the backup environment, such as what is specific practices are undertaken on a regular basis for ensuring it’s operating as designed, etc. 1.0 Overview In accordance with mandated organizational security requirements set forth and approved by management, [company name] has established a formal Data Backup and Recovery policy and supporting procedures. This policy is to be implemented immediately along with all relevant and applicable procedures. Additionally, this policy is to be evaluated on a(n) [annual, semi-annual, quarterly] basis for ensuring its adequacy and relevancy regarding [company name]'s needs and goals. 1.0 Purpose This policy and supporting procedures are designed to provide [company name] with a documented and formalized Data Backup and Recovery policy that is to be adhered to and utilized throughout the organization at all times. Compliance with the stated policy and supporting procedures helps ensure the safety and security of [company name] I.T. system resources and all supporting assets. Backups are a critical process for any organization, especially considering today’s growing regulatory compliance mandates and the ever-increasing cyber security threats for which business face on a daily basis. Yet even without compliance mandates, a well-though out, efficient, and reliable backup and recovery is a must for ensuring the confidentiality, integrity, and availability (CIA) of critical data. 1.0 Scope This policy and supporting procedures encompasses all system resources and supporting assets that are owned, operated, maintained, and controlled by [company name] and all other system resources, both internally and externally, that interact with these systems. • Internal system resources are those owned, operated, maintained, and controlled by [company name] and include all network devices (firewalls, routers, switches, load balancers, other network devices), servers (and the operating systems and applications that reside on them, both physical and virtual servers) and any other system resources and supporting assets deemed in scope. • External system resources are those owned, operated, maintained, and controlled by any entity other than [company name], but for which these very resources may impact the confidentiality, integrity, and availability (CIA) of [company name] system resources and supporting assets. 1.0 Policy [Company name] is to ensure that the Data Backup and Recovery policy adheres to the following conditions for purposes of complying with the mandated organizational security requirements set forth and approved by management: Backup environments A critical component of any data backup and recovery initiatives is to properly identify all environments – and the associated data – that required backup procedures. While critical environments, such as those relating to production, development, and staging require backups, it’s the platforms and the supporting systems within these environments that are to be identified, with applicable backup procedures in place. This would include, but not limited to, the following platforms and supporting systems: Authorization Form for User Access | New Employees General User Information User Name New Employee: (circle) YES NO Last Name First Name Middle Name Social Security Number or Internal Employee ID Number Date of Request Office Address Street Address City State ZIP Country Have all the following applicable Human Resource new hire procedures been executed and fully completed prior to granting access for the new user: (1). Completed Application. Yes No N/A Date of Completion: Enter Date (2). Reference and Background Checks. Yes No N/A Date of Completion: Enter Date (3). Credit Check. Yes No N/A Date of Completion: Enter Date (4). Criminal Background Check. Yes No N/A Date of Completion: Enter Date (5). Drug Tests. Yes No N/A Date of Completion: Enter Date (6). Assignment of company property. Yes No N/A Date of Completion: Enter Date (7). Please list any other new hire procedures that were performed: Please provide any additional comments and/or necessary informationregarding the applicable new hire procedures: User Information Type of User: Title Job Function Telephone Expiration Date (if applicable) Department Division Office Immediate Supervisor Secondary Supervisor Please provide a general explanation and overview of why the specified user is being granted access to [company name] system resources: List all applicable "identities" granted to new user: Business Justification & Reasoning: (1). Username for accessing company-wide files system and for email, which consists of first letter of first name, followed by complete spelling of last name. Jdoe. Necessary for performing duties as required . (2). Granted access to trial production environment using the following username: jdoeprod001. Necessary for performing duties as required . (3). Granted access to web portal for accessing client information using the following username: john.doe001. Necessary for performing duties as required .