Security Manual

Security Manual Template

GDPR / ISO 27000 / HIPAA / SOX / CobiT Compliant

Includes PCI DSS Audit Program and 24 Electronic Forms that are ready to use


Order Security Policies and ProceduresDownload TOC security policiesVersion History Security Policies


The Security Manual for the Internet and Information Technology is over 230 pages in length. All versions of the Security Manual template include both the Business & IT Impact Questionnaire and the Threat & Vulnerability Assessment Tool (both were redesigned to address Sarbanes Oxley compliance). In addition, the Security Manual Template PREMIUM Edition  contains 16 detail job descriptions that apply specifically to security and Sarbanes Oxley, ISO security domains, ISO 27000 (ISO27001 and ISO27002), PCI-DSS, HIPAA, and CobiT.

Data Security and Protection are a priority and this template is a must have tool that every CIO and IT department must have. Over 3,000 enterprise worldwide have acquired this tool and it is viewed by many as the Industry Standard for Security Management and Compliance.

Security Template Licenses

Security Manual - Comprehensive, Detailed and Customizable for Your Business

The IT Security Manual Template provides all the essential sections of a complete security manual and walks you through the creation of each step. Detailed language addressing more than a dozen security topics is included in a 230 plus page Microsoft Word document, which you can modify as much or as little as you need to fit your business requirements. The template includes sections on critical topics like:

  • Risk analysis
  • Staff member roles
  • Physical security
  • Electronic Communication (email / Smartphones)
  • Blogs and Personal Web Sites
  • Facility design, construction and operations
  • Media and documentation
  • Data and software security
  • Network security
  • Internet and IT contingency planning
  • Insurance
  • Outsourced services
  • Waiver procedures
  • Employee Termination Procedures and Forms
  • Incident reporting procedures
  • Access control guidelines
  • PCI DSS Audit Program as a separate document
  • Security Compliance Checklists
  • Massachusetts 201 CMR 17 Compliance Checklist

The Security Manual Template can be acquired as a stand alone item (Standard) or in the Premium or Gold sets:

Security Manual Template - Standard Edition

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerabiltuy Assessment Form PDF and MS Excel Format

    Order Security ManualDownload Security Table of Contents

Security Manual Template - Premium Edition

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerabiltuy Assessment Form PDF and MS Excel Format
  • Security Audit Program MS Excel Format
  • 16 Security Job Descriptions MS Word Format
    • Manager Network Services
    • Manager Security and Workstations
    • Manager Training - Documentation
    • Manager Voice and Data Communication
    • Manager Wireless Systems
    • Network Security Analyst
    • System Administrator - Linux
    • System Administrator - Unix
    • System Administrator - Windows
    • Wi-Fi Administrator
Order Security ManualDownload Security Table of Contents

Security Manual Template - Gold Edition

  • Security Manual Template in MS Word Format
  • Business and IT Impact Questionnaire MS Word Format
  • Threat and Vulnerabiltuy Assessment Form PDF and MS Excel Format
  • Security Audit Program MS Excel Format
  • 231 Job Descriptions from the Internet and IT Job Descriptions HandiGuide in MS Word Format including all of the job descriptions in the Premium Edition.
Order Security ManualDownload Security Table of Contents

DR BC SecurityDisaster Recovery Business Continuity & Security Manual Templates Standard

  • Disaster Recovery Business Continuity Template

  • Security Manual Template

Both of the templates have been recently updated to meet new compliance requirements for ransomware, EU madated issues and BREXIT operational considerations

"Best of Breed - Best Practices Disaster Recovery Planning / Business Continuity Planning and Security Policies" according to the IT Productivity Center

Order DRP BCP SecurityDownload Table of Contents Security and DRP templates