Changineers Security Policies, Standards, and Procedures¶
- 0. Security Program Overview
- 1. Policy Management
- 2. Security Architecture and Operating Model
- 3. Roles, Responsibilities and Training
- 4. Risk Management and Risk Assessment Process
- 5. Compliance Audits and External Communications
- 6. System Audits, Monitoring and Assessments
- 7. HR and Personnel Security
- 8. Access
- 9. Facility Access and Physical Security
- 10. Data Management
- 11. Data Protection
- 12. Secure Software Development and Product Security
- 13. Configuration and Change Management
- 14. Threat Detection and Prevention
- 15. Vulnerability Management
- 16. Mobile Device Security and Media Management
- 17. Business Continuity and Disaster Recovery
- 18. Incident Response
- 19. Breach Investigation and Notification
- 20. Third Party Security and Vendor Risk Management
- Appendix A. Employee Handbook
- Appendix B. Approved Software
- Appendix C. Acceptable Use of AI Tools
- Appendix D. Subprocessors