Welcome to the Toolkit Insider Series, where you will get access to samples of IT Governance Publishing’s world-leading documents, as well as information on how the templates work, who is responsible for the document and why you would benefit from having certain policies or procedures in place.
In the first month of the Toolkit Insider Series, we will be taking a closer look at the Cyber Essentials Toolkit. The first instalment covers monitoring policies.
The Cyber Essentials Toolkit
Built on expert knowledge gained from numerous cyber security implementation projects, this toolkit includes work procedures and processes for ensuring that the controls you are implementing, according to the requirements of the scheme, are effective in delivering what they intend to do.
Who is responsible for this document?
Asset owners and the head of IT are responsible for this policy. They will need to agree on the logging and monitoring capabilities of the systems they own and for them to meet the monitoring requirements.
They will need to make sure their organisation’s workstations, computers, servers, network devices, mobile phones, PDAs, etc. are subject to this policy.
The manager or executive will need to approve this document.
The benefits of a monitoring policy
Good monitoring is key to responding to attacks across the organisation. Additionally, a monitoring policy will allow you to ensure that systems are being used correctly throughout your organisation in accordance with your policies and procedures.
In short, by monitoring your systems you will be able to:
• Detect attacks;
• Account for activity; and
• Respond to attacks;
Inside our Monitoring Policy
Here is a sample of the Monitoring Policy that can be found in our Cyber Essentials Toolkit.
In the second instalment of this month’s Insider Toolkit Series, we will be looking at the access control policies template.
20% discount on all Cyber Essentials products
Throughout August, IT Governance Publishing is offering a 20% discount on all Cyber Essentials products, including the Cyber Essentials Toolkit. Just enter code CYBER20 at the checkout to receive your discount.
Interested in this document?
To purchase this document separately, please contact us at email@example.com.