All of our policies and templates are in Word or Excel format for easy customization.
-
System and Information Integrity Policy – NIST SI-1
Policies $299.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST SI-1.
-
System Development Life Cycle Change Management Policy NIST CM-1
Policies $299.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST PR.IP-1-3 CM-1 Configuration management policy and procedures.
-
Identity Access Control Policies NIST AC-1 and IA-1
Policies $299.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST AC-1 and IA-1.
-
Supply Chain Risk Management Policy – NIST SR-1
Policies $299.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST SR-1.
-
Disaster Recovery Plan and Impact Analysis Template NIST CP-10
NIST Control Audit Templates $399.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST CP-10 System Recovery and Reconstitution.
-
Risk Assessment Policy and Template NIST RA-1 & RA-3
Policies $399.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST RA-1 Risk Assessment Policy.
-
NIST Cybersecurity Policies: IR-1 and IR-8 Incident Response Policy and Reporting
Policies$500.00Original price was: $500.00.$399.00Current price is: $399.00. Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST IR-1 Incident Response Policy and IR-8 Incident Response Plan.
-
Information Security Roles and Responsibilities Policy and Template NIST PM-1
Policies $399.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST PM-1 Information Security and Privacy Program and Resources Policy.
-
Business Continuity Plan Policy, Requirements and Test Templates NIST CP
NIST Control Audit Templates $499.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST PR.IP-9 Contingency Planning
-
Third Party Service and Software Providers Policy and Inventory and Evaluation Templates NIST ID.AM-4
Policies $499.00 Add to cartComposed by our technical writer, this customizable Word document enables compliance with NIST ID.AM-4 Third Party Service and Software Providers Policy, Inventory Template and Evaluation Template
-
SSAE18 SOC2 Readiness Package
NIST Cybersecurity Policy & $7,500.00 Add to cartComposed by our technical writer, this customizable package enables compliance with SSAE18 SOC2.
Products Introduction:
The National Institute of Standards and Technology (NIST) published the fifth revision of Special Publication 800-53, Security and Privacy Controls for Federal Information Systems and Organizations. The publication provides security and privacy controls for information systems and organizations to protect operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks. NIST is a comprehensive list of security and privacy controls.
IS Security Solutions, LLC has mapped NIST 800-53 Rev 5 to multiple regulatory compliance requirements including: Sarbanes-Oxley, SSAE18 SOC2 (AICPA Trust Services), CMMC, PCI and HiTrust. Our technical writer has developed corresponding policies and process templates that are clear, concise, and written with the intent of being implemented and adhered to by employees at every level. Our policies are not high-level generic documents, instead the content reads as process and procedure guidelines.
In our SOC 2 Control Matrix, we have mapped the AICPA’s 33 Common Criteria, 28 additional availability, confidentiality, processing integrity and privacy control objectives and approximately 200 point of focus to the corresponding NIST 800-53 Rev 5 compliance controls. Furthermore, we took the time to also provide a simplified version of the control wording to clarify the intent of the control. Next we defined the documentation or support that will be required for an audit as evidence the control is in place and working as intended. Lastly, we specified the procedures your auditor is likely to perform to help ensure a clean audit opinion.