Changineers Security Policies, Standards, and Procedures¶
- 0. Security Program Overview
- 1. Security Architecture and Operating Model
- 2. Roles, Responsibilities and Training
- 3. Policy Management
- 4. Risk Management and Risk Assessment Process
- 5. System Audits, Monitoring and Assessments
- 6. HR and Personnel Security
- 7. Access
- 8. Facility Access and Physical Security
- 9. Data Management
- 10. Data Protection
- 11. Secure Software Development and Product Security
- 12. Configuration and Change Management
- 13. Threat Detection and Prevention
- 14. Vulnerability Management
- 15. Business Continuity and Disaster Recovery
- 16. Breach Investigation and Notification
- Appendix A. Approved Software