CAP Index Security Policies, Standards, and Procedures¶
- 0. Security Program Overview
- 1. Corporate Governance
- 2. Policy Management
- 3. Security Architecture and Operating Model
- 4. Roles, Responsibilities and Training
- 5. Risk Management and Risk Assessment Process
- 6. Compliance Audits and External Communications
- 7. System Audits, Monitoring and Assessments
- 8. HR and Personnel Security
- 9. Access
- 10. Facility Access and Physical Security
- 11. Asset Inventory Management
- 12. Data Management
- 13. Data Protection
- 14. Secure Software Development and Product Security
- 15. Configuration and Change Management
- 16. Threat Detection and Prevention
- 17. Vulnerability Management
- 18. Mobile Device Security and Media Management
- 19. Business Continuity and Disaster Recovery
- 20. Incident Response
- 21. Breach Investigation and Notification
- 22. Third Party Security and Vendor Risk Management
- 23. Privacy Practice and Consent
- 24. Addendum and References
- Appendix A. Employee Handbook
- Appendix B. Approved Software
- Appendix C. Approved Vendors
- Appendix D. Key Definitions
- Appendix E. NIST Controls Mapping
- Appendix F. Privacy Policy
- Appendix G. Cookie Policy
- Appendix H. GDPR Data Processing Agreement
- Appendix I. Cookie Policy