Security Policies

Security policies help ensure systems and data are protected from accidental or intentional actions that impact information availability, confidentiality, or integrity.  For many organizations, creating security policies can be time and cost prohibitive.  In addition, an organization may not have the knowledge or experience needed. Fortunately, a better solution exists - security policy templates ready made to help organizations meet security and compliance requirements.

The Altius IT Policy Collection provides over 180 security policies, procedures, plans, and forms offering the following benefits:

  • Customizable - documents are in Word format and can be customized to your specific environment
  • Compliance - quickly meet compliance requirements
  • No conflicts - no software to download or install on your computer system
  • Payment options - credit card, bank wire, purchase order, PayPal

If you need security policies, an information security policy, cyber security policy, or IT policies, the Altius IT Policy Collection will meet your needs.

Silver Collection
(180+ documents without updates)

Silver Collection


Gold Collection
(180+ documents with 1 yr. free updates)

Gold Collection


Security Policies
(All documents are included with your purchase)

Network Security


Risk Management

Network Security Policies and Plans
Acceptable Use Policy
Access Control Policy
Access Control Procedure
Account Management Policy
Acquisition and Procurement Policy
Admin Special Access Policy
Anti-Malware Policy
Anti-Malware Procedure
Asset Management Policy
Audit Trails Policy
Backup Plan
Backup Policy
Backup Procedure
Bluetooth Policy
Certification and Accreditation Policy
Change Management Policy
Change Management Procedure
Configuration Management Plan
Configuration Management Policy
Data Analytics Policy
Data Center Management Policy
Data Integrity Policy
Data Marking Policy
Data Retention Policy
Database Security Policy
Disposal Policy
Domain Controller Policy
Domain Name System Policy
E-commerce Policy
Encryption Policy
Engineering Trustworthy Secure Systems Policy
Facility Security Plan
Firewall Hardening Procedure
Firewall Policy
Firewall Procedure
Guest Access Policy
Hardware and Software Maintenance Policy
Hardware and Software Maintenance Procedure
Identification and Authentication
Internet Connection Policy
Logging Policy
Logging Procedure
Logical Access Controls Policy
Media Protection Policy
Network Address Policy
Network Configuration Policy
Network Documentation Policy
Network Security Policy
Password Policy
Patch Management Policy
Patch Management Procedure
Personnel Security Policy
Physical Access Policy
Physical Security Policy
Planning Policy
Problem Management Policy
Problem Management Procedure
Program Management Policy
Procedure Template
Ransomware Policy
Receipt & Acknowledgement
Remote Access Policy
Removable Media Policy
Router Security Policy
Securing Information Systems Policy
Securing Sensitive Information Policy
Security Architecture Policy
Security Monitoring Policy
Server Certificates Policy
Server Hardening Policy
Server Hardening Procedure
Software Licensing Policy
System Security Plan
System Update Policy
Terms and Definitions Policy
User Privilege Policy
Vendor Access Policy
VPN Policy
Wireless Access Policy
Workstation Hardening Procedure
Workstation Security Policy
Compliance Policies and Plans
Audit Policy
Clear Desk Policy
Compliance Policy
Compliance and Standards Matrix
Data Privacy Policy
Data Privacy and Protection Policy
Ethics Policy
GDPR EU Privacy and Data Protection
Genetic Data Privacy Policy
Health Safety Policy
Identity Theft Protection Policy
Outsourcing Policy
PCI Policy
PII Processing Transparency Policy
Privacy Policy (CCPA, CPRA, & others)
Protecting CUI NIST 800-171 Policy
Security Awareness and Training Plan
Security Awareness and Training Policy
Security Controls Review Policy
Security Privacy Controls NIST 800-53 Policy
System Controls SOC2 Policy
Third Party Service Providers Policy
Vulnerability and Penetration Testing
Web Site Privacy Policy

Security Governance
Bring Your Own Device & Technology
Business Secrets Policy
Context and Alignment Policy
Corporate IT Policy
Cybersecurity Policy
Cybersecurity Framework Policy
Cybersecurity Supply Chain Risk Management
Documentation Policy
E-mail Policy
Green Computing Policy
IT Governance Policy
IT Management Policy
Information Security Policy
Mass Communication Policy
Mergers and Acquisitions Policy
Mobile Device Policy
Portable Computing Policy
Production Input Output Controls Policy
Release Management Policy
Remote Work Policy
Reporting Violations Policy
Security Policy (highest level document)
Smartphone Policy
Social Networking Policy
Staffing Policy
Standard Operating Procedure Policy

System and Communications Protection Policy
System and Information Integrity Policy
System and Services Acquisition Policy
Wearable Computing Device Policy
Risk Management Policies
Business Impact Analysis Policy
Data Classification Policy
Quality Assurance Policy
Risk Assessment Policy
Risk Management Policy
Security Self Assessment Policy

Incident Response
Identity Theft Protection Policy
Incident Response Plan
Incident Response Policy
Intrusion Detection Policy

Business Continuity Policies/Plans
Business Continuity Communications
Business Continuity Disaster Recovery
Business Continuity Department Plan
Business Continuity Plan
Business Continuity Policy
Business Continuity Resumption Plan Resilience Policy

Application Security Policies
Application Implementation Policy
Approved Application Policy
Secure Software Development Lifecycle
Software Development Policy
Web Site Policy

Asset Transfer Form
Audit Log Form
Backup Log Form
Business Impact Analysis Questionnaire
Change Management Log Form
Daily Network Checklist Form
Incident Response Form
I.S. Access Request Form
I.S. Log Form
Problem Management Form
Third Party Service Provider Log Form

Business Associate Agreement
Non-disclosure Agreement

Payment Options

Credit Card - Altius IT accepts most major credit cards. To pay by credit card, select either our Silver or Gold collection.

Bank Wire - Organizations outside of the United States may want to contact us for instructions to wire funds to our bank account.

Purchase Order - contact us for instructions to acquire the Altius IT Policy Collection using your organization's Purchase Order.  Note, using a Purchase Order may delay your access to the Altius IT Policy Collection.
PayPal - Altius IT accepts payment by PayPal.
PayPal Payment Options

Tags: security policies | information security policy | cyber security policy | it security policy | security policy templates | policies and procedures

Certified Auditors

Certified Information Systems Auditors
Altius IT's auditors are certified to audit your systems and issue reports and opinions on your security. We help you identify, manage, and reduce your risks. Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets

For a full list of our certifications please visit our About Us page.