We use cookies to deliver you the best experience on our website. By continuing to use our website, you consent to our cookie usage and revised Privacy Statement.

Filter By:

Type

Topic

Recent Blogs & Podcasts

Tools & Templates

\ Tools & Templates

 

Our collection of tools, toolkits, templates, checklists, matrices and maps provides assistance for tackling specific InfoSec initiatives. Developed by industry experts, these materials offer step-by-step guidance on approaching and completing common tasks.

IANS Tools & Templates



October 22, 2018 | Cloud Access Security Brokers

 CASB Feature Checklist

This checklist details the primary features every organization should assess to ensure the cloud access security broker (CASB) they choose aligns with their cloud security goals.

Read More »


October 19, 2018 | Incident Response Planning

 Ransomware Preparation and Response Checklist

Like other network events and security incidents, ransomware infections should be integrated into your overall business continuity efforts and incident response plan. This checklist steps you through the process. 

Read More »


October 12, 2018 | Data Breaches

 Post-Incident Q&A Checklist

While no two cybersecurity incidents are the same, questions from the media, customers and other external stakeholder groups tend to cover the same topics following the disclosure of a breach. This checklist contains 10 of the most commonly asked questions companies should be prepared to answer following a cybersecurity incident, along with high-level guidance for responding to inquiries.

Read More »


October 12, 2018 | Incident Response Planning

 Cyber Incident Communications Checklist

This high-level communications checklist is designed to be followed during the first 72 hours of an incident. It is meant to guide the response process as the incident develops and should be adjusted to suit a company’s bandwidth and operations, as well as the circumstances of the incident. 

Read More »


October 5, 2018 | Security Policies and Strategy

 Zero-Trust Zone Acceptable Use Policy Template

This template provides an acceptable use policy for a system within a zero-trust network zone, including detailed expectations, consequences for violations, and obligations during and after access.

Read More »


September 28, 2018 | Business Continuity and Disaster Recovery (BCDR)

 Business Impact Analysis Template

This template can be used to help the business identify and prioritize critical assets that must be protected and recovered during a business continuity/disaster recovery (BC/DR) event.  

Read More »


September 21, 2018 | Cloud Application and Data Controls

 Office 365 Checklist

This checklist is designed to help organizations roll out Office 365 efficiently and securely.

Read More »


September 14, 2018 | Cloud Network and Host Controls

 Cloud Terminology Cheat Sheet (Updated)

This cheat sheet compares key services and cloud terms among major cloud services. This update provides Google Computer Platform (GCP) terminology, in addition to Amazon Web Services (AWS) and Microsoft's Azure. 

Read More »