Information Security Policies and Security Specifications


Information Security Policies and Security Specifications

Over the years we have created a variety of guidelines and specifications. Most guidelines and specifications are based on the DIN ISO 27001 and 2 standards. All guidelines are standardized and predefined and only need to be slightly adapted to your IT environment. Individualization includes your layout, your references and references to other internally applicable regulations and, of course, any special requests (e.g. shortening or expanding a chapter, special graphics or fixed deviations from generally applicable standards).

Explore More

Alexander Tsolkas was nicknamed the Policy Pope more than two decades ago. We delivered the most and we claim the best policies for businesses. Whether lean guidelines or detailed ones, our guidelines were in demand. Today, guidelines are needed more than ever. For this reason we have also expanded our range.

Information Security Policies
  • Archiving
  • Audit controls
  • Authentication and Authorization
  • Backup and backup processes
  • Biometrics
  • BlackBerry Enterprise Server and Client
  • BYOD Policy for iPhone and iPad
  • BYOD Policy for Android
  • BYOD Policy for Windows Mobile
  • Cloud Computing Security Standards
  • Cloud Computing Security Policy
  • Corporate Information Security
  • Web Application Firewall
  • Firewall
  • Intrusion prevention
  • Secure gateways
  • Routers
  • VPN
  • Remote Access and Third Party Access
  • Mobile computing
  • Teleworking
  • Telecommunication
  • WLAN
Information Security
  • Password
  • Physical security guidelines
  • PKI standards
  • Product security
  • Reporting Requirements and Event Management
  • Risk Acceptance and Deviations
  • Roles and Permissions for Identity Management
  • Secure authentication (dual authentication)
  • Security Requirements for Vendors
  • User Security Awareness
  • Virus Control and Malicious Code
  • SAP
  • SAN
  • Citrix
  • Internet Explorer
  • Computer risk analysis
  • Confidentiality Agreements
  • Cryptographic Controls
  • Data Loss Prevention
  • Development Standards and Secure Coding
  • Directory standards
  • Disaster recovery
  • eDiscovery
  • Information handling and labeling
  • IT Contingency Planning Policy and Manual
  • IT security compliance
  • Joint venture
  • Windows 2010
  • Windows 2011
  • UNIX generic
  • AIX 7
  • Solaris 11
  • HP-UX 11.x
  • SuSE Linux Enterprise 15
  • Red Hat Enterprise 9
  • Debian 12
  • Oracle 19 and 21
  • Sybase
  • SQL Server 2022
  • Mozilla Firefox 118
  • Java 8
  • Web server and web application

We can also offer an audit checklist for each policy. All policies are available in German and English. You will receive the products printed and bound in color in the current Office format and in PDF format, as well as a copy of each on a data medium.

Since we are not big fans of security policies in paper form, even if they are mainly required in this form, we can still offer you policy management using Verinice.

All policies will be handed out as Word, PDF and in paper bound form with a hard cover.