Policy
ResourceInformation Security Policy
Defines the organization’s approach to protecting information assets, systems, and data across people, process, and technology.

Resources
Policies, templates, guides, runbooks, and tabletop exercises you can reuse across clients.
How to use this
Filter by resource type, search by title/tags, then download, generate, or view. Later, these can be linked directly to findings inside Risk Workspace.
Blue is for navigation / focus. Orange highlights section titles and primary actions.
Browse resources
Showing 30 of 30
Search by title, summary, or tags. Filter by resource type.
Policies
3 itemsRecommended policy resources for client delivery.
Policy
ResourceInformation Security Policy
Defines the organization’s approach to protecting information assets, systems, and data across people, process, and technology.
Policy
ResourceAcceptable Use Policy (AUP)
Baseline acceptable use rules for corporate devices, email, and systems.
Policy
ResourceAI Acceptable Use Policy
Rules for responsible AI use, approved tools, and data handling for client review.
Frameworks
10 itemsRecommended framework resources for client delivery.
Framework
ResourceNIST CSF 2.0
A risk-based framework to understand, assess, prioritize, and communicate cybersecurity outcomes across Identify, Protect, Detect, Respond, and Recover.
Framework
ResourceCIS Controls v8
A prioritized set of 18 safeguards to reduce the most common cyber risks; practical for SMB and enterprise control implementation.
Framework
ResourceNIST SP 800-61 Rev. 3
Incident response recommendations and considerations aligned to cybersecurity risk management activities (CSF 2.0 alignment).
Framework
ResourceISO/IEC 27001
International standard specifying requirements for an Information Security Management System (ISMS).
Framework
ResourceSOC 2
Assurance reporting framework for service organizations based on Trust Services Criteria (security, availability, processing integrity, confidentiality, privacy).
Framework
ResourceMITRE ATT&CK
A knowledge base of adversary tactics and techniques used to drive threat modeling, detection engineering, and threat-informed defense.
Framework
ResourceNIST AI RMF 1.0
Guidance to manage risks of AI systems and improve trustworthiness across Govern, Map, Measure, and Manage functions.
Framework
ResourceNIST Privacy Framework
A voluntary framework to help organizations identify and manage privacy risk through enterprise risk management.
Framework
ResourceGDPR (Regulation (EU) 2016/679)
EU regulation governing personal data protection and privacy rights, including lawful processing, data subject rights, and accountability obligations.
Framework
ResourceISO 22301
International standard for Business Continuity Management Systems (BCMS) to build resilience and recover from disruptive incidents.
Runbooks
1 itemsRecommended runbook resources for client delivery.
Runbook
ResourceIncident Response Quick Runbook
A one-page IR checklist for triage, containment, and communications.
Tabletop Exercises
16 itemsRecommended tabletop resources for client delivery.
Tabletop
ResourceRansomware attack on core business systems
60–90 minute, decision-focused exercise mapped to NIST IR + CIS (8, 17, 18).
Tabletop
ResourcePhishing → credential compromise
Identity compromise scenario emphasizing executive decisions for containment and recovery.
Tabletop
ResourceData exfiltration & breach notification
Decisions around containment, forensics, legal counsel, and notification timelines.
Tabletop
ResourceThird-party / vendor compromise
Vendor incident handling, contractual obligations, and continuity decision-making.
Tabletop
ResourceInsider threat (malicious or negligent)
HR/legal coordination, evidence handling, and containment decisions under pressure.
Tabletop
ResourceBusiness email compromise (BEC)
Fraud response and financial decision-making with comms and recovery sequencing.
Tabletop
ResourceWebsite defacement
Public-facing incident decisions including containment, restoration, and PR messaging.
Tabletop
ResourceCloud service outage
Continuity, vendor escalation, and recovery sequencing decisions during outages.
Tabletop
ResourceMalware propagation across endpoints
Isolation tradeoffs, operational impact decisions, and recovery prioritization.
Tabletop
ResourceLost/stolen device with sensitive data
Data exposure, legal obligations, and user/customer communications decisions.
Tabletop
ResourceRegulatory & reputational impact discussions
Executive decision-making on disclosure strategy, regulator engagement, and PR.
Tabletop
ResourceBackup Failure / Recovery Failure
Decision-making when restoration fails and operations must continue under constraints.
Tabletop
ResourceIdentity / Privileged Access Compromise
Privileged account abuse decisions, containment steps, and credential reset sequencing.
Tabletop
ResourceShadow IT / Unauthorized SaaS
Discovery, risk acceptance, and containment decisions without deep technical jargon.
Tabletop
ResourceIncident Communications Breakdown
Focuses on decision ownership, escalation, and messaging when coordination fails.
Tabletop
ResourceSupply Chain / Software Update Compromise
Decisions around vendor trust, rollback strategy, customer impact, and recovery plans.