Information Security Policy Template
Information Security Policy Template
0
Status: ☒ Working Draft ☐ Approved ☐ Adopted
Document Owner: Information Security Committee
Last Review Date: August 2020
Confidentiality – Ensuring that information is accessible only to those entities that are
authorized to have access, many times enforced by the classic “need to know” principle.
Integrity – Protecting the accuracy and completeness of information and the methods that
are used to process and manage it.
Availability – Ensuring that information assets (information, systems, facilities, networks, and
computers) are accessible and usable when needed by an authorized entity.
(Company) has recognized that our business information is a critical asset and as such our ability to
manage, control, and protect this asset will have a direct and significant impact on our future success.
This document establishes the framework from which other information security policies may be
developed to ensure that the enterprise can efficiently and effectively manage, control and protect its
business information assets and those information assets entrusted to (Company) by its stakeholders,
partners, customers and other third parties.
The (Company) Information Security Program is built around the information contained within this policy
and its supporting policies.
Purpose
The purpose of the (Company) Information Security Policy is to describe the actions and behaviors
required to ensure that due care is taken to avoid inappropriate risks to (Company), its business partners,
and its stakeholders.
Audience
The (Company) Information Security Policy applies equally to any individual, entity, or process that
interacts with any (Company) Information Resource.
Responsibilities
Executive Management
Ensure that an appropriate risk-based Information Security Program is implemented to
protect the confidentiality, integrity, and availability of all Information Resources collected or
maintained by or on behalf of (Company).
Ensure that information security processes are integrated with strategic and operational
planning processes to secure the organization’s mission.
Ensure adequate information security financial and personnel resources are included in the
budgeting and/or financial planning process.
Ensure that the Security Team is given the necessary authority to secure the Information
Resources under their control within the scope of the (Company) Information Security
Program.
Designate an Information Security Officer and delegate authority to that individual to ensure
compliance with applicable information security requirements.
Ensure that the Information Security Officer, in coordination with the Information Security
Committee, reports annually to Executive Management on the effectiveness of the
(Company) Information Security Program.
Policy
(Company) maintains and communicates an Information Security Program consisting of topic-
specific policies, standards, procedures and guidelines that:
o Serve to protect the Confidentiality, Integrity, and Availability of the Information
Resources maintained within the organization using administrative, physical and
technical controls.
o Provide value to the way we conduct business and support institutional objectives.
o Comply with all regulatory and legal requirements, including: (adjust as appropriate)
Definitions
See Appendix A: Definitions
References
ISO 27002: 5, 6, 7, 18
NIST CSF: ID.AM, ID.BE, ID.GV, PR.AT, PR.IP
Information Security Committee Charter
Waivers
Waivers from certain policy provisions may be sought following the (Company) Waiver Process.
Enforcement
Personnel found to have violated this policy may be subject to disciplinary action, up to and including
termination of employment, and related civil or criminal penalties.
Any vendor, consultant, or contractor found to have violated this policy may be subject to sanctions up to
and including removal of access rights, termination of contract(s), and related civil or criminal penalties.
Version History
Version Modified Date Approved Date Approved By Reason/Comments
NEED HELP?
FRSecure is a full-service information security consultancy.
If you need assistance with anything in this resource, please don’t hesitate to reach out to us.
CONTACT US
More resources