Security Policies

Security policies help ensure systems and data are protected from accidental or intentional actions that impact information availability, confidentiality, or integrity.  For many organizations, creating security policies can be time and cost prohibitive.  In addition, an organization may not have the knowledge or experience needed. Fortunately, a better solution exists - security policy templates ready made to help organizations meet security and compliance requirements.

The Altius IT Policy Collection provides over 100 security policies, plans, and forms offering the following benefits:

  • Customizable - documents are in Word format and can be customized to your specific environment
  • Compliance - quickly meet compliance requirements
  • No conflicts - no software to download or install on your computer system
  • Payment options - credit card, bank wire, purchase order, PayPal

If you need security policies, an information security policy, cyber security policy, or IT policies, the Altius IT Policy Collection will meet your needs.

Security Policy Templates         Sample Policy          Compliance Matrix

Silver Collection
(100+ documents without updates)

Silver Collection


Gold Collection
(100+ documents with 1 yr. free updates)

Gold Collection


Security Policies
(All documents are included with your purchase)

Network Security


Risk Management

Network Security Policies and Plans
Acceptable Use Policy
Access Control Policy
Account Management Policy
Acquisition and Procurement Policy
Admin Special Access Policy
Anti-Malware Policy
Asset Management Policy
Audit Trails Policy
Backup Plan
Backup Policy
Bluetooth Policy
Certification and Accreditation Policy
Change Management Policy
Data Integrity Policy
Data Marking Policy
Data Privacy Policy
Data Retention Policy
Database Security Policy
Disposal Policy
Domain Controller Policy
Domain Name System Policy
E-commerce Policy
Encryption Policy
Facility Security Plan
Firewall Policy
Guess Access Policy
Hardware and Software Maintenance
Identification and Authentication
Internet Connection Policy
Logging Policy
Logical Access Controls Policy
Network Address Policy
Network Configuration Policy
Network Documentation Policy
Password Policy
Patch Management Policy
Personnel Security Policy
Physical Access Policy
Physical Security Policy
Problem Management Policy
Procedure Template
Ransomware Policy
Receipt & Acknowledgement
Remote Access Policy
Removable Media Policy
Router Security Policy
Securing Information Systems Policy
Securing Sensitive Information Policy
Security Monitoring Policy
Security Policy (IT Security Policy)
Server Certificates Policy
Server Hardening Policy
Software Licensing Policy
System Security Plan
System Update Policy
Terms and Definitions Policy
User Privilege Policy
Vendor Access Policy
VPN Policy
Wireless Access Policy
Workstation Hardening Policy
Workstation Security Policy
Compliance Policies and Plans
Audit Policy
Clear Desk Policy
Compliance Policy
Identity Theft Protection Policy
Outsourcing Policy
PCI Policy
Privacy Policy
Security Awareness and Training Plan
Security Awareness and Training Policy
Security Controls Review Policy
System Controls SOC2 Policy
Third Party Service Providers Policy
Vulnerability and Penetration Testing
Web Site Privacy Policy

Security Governance
Bring Your Own Device & Technology
Context and Alignment Policy
Cybersecurity Policy
Cybersecurity Framework Policy
Documentation Policy
E-mail Policy
Green Computing Policy
IT Governance Policy
IT Management Policy
Mass Communication Policy
Mergers and Acquisitions Policy
Mobile Device Policy
Portable Computing Policy
Production Input Output Controls Policy
Reporting Violations Policy
Smartphone Policy
Social Networking Policy
Staffing Policy
Wearable Computing Device Policy
Risk Management Policies
Business Impact Analysis Policy
Data Classification Policy
Quality Assurance Policy
Risk Assessment Policy
Risk Management Policy
Security Self Assessment Policy

Incident Response
Identity Theft Protection Policy
Incident Response Plan
Incident Response Policy
Intrusion Detection Policy

Business Continuity Policies/Plans
Business Continuity Communications
Business Continuity Disaster Recovery
Business Continuity Department Plan
Business Continuity Plan
Business Continuity Policy
Business Continuity Resumption Plan Resilience Policy

Application Security Policies
Application Implementation Policy
Approved Application Policy
Secure Software Development Lifecycle
Software Development Policy
Web Site Policy

Audit Log Form
Backup Log Form
Business Impact Analysis Questionnaire
Change Management Log Form
Incident Response Form
I.S. Access Request Form
I.S. Log Form
Problem Management Form
Third Party Service Provider Log Form

Business Associate Agreement
Non-disclosure Agreement

Payment Options

Credit Card - Altius IT accepts most major credit cards. To pay by credit card, select either our Silver or Gold collection.

Bank Wire - Organizations outside of the United States may want to contact us for instructions to wire funds to our bank account.

Purchase Order - contact us for instructions to acquire the Altius IT Policy Collection using your organization's Purchase Order.  Note, using a Purchase Order may delay your access to the Altius IT Policy Collection.
PayPal - Altius IT accepts payment by PayPal.
PayPal Payment Options

Tags: security policies | information security policy | cyber security policy | it security policy | security policy templates | policies and procedures

Certified Auditors

Certified Information Systems Auditors
Altius IT's auditors are certified to audit your systems and issue reports and opinions on your security. We help you identify, manage, and reduce your risks. Our comprehensive audit service uncovers gaps in your existing defenses so that you can better:

  • Fortify your network infrastructure
  • Comply with regulatory requirements
  • Protect your valuable assets

For a full list of our certifications please visit our About Us page.