Our documents are based on successfully executed projects which save you time and money.
business , compliances , security , visio-stencils

Sample Visio – CISO Corporate Security Structure

March 15, 2012

Free – Visio Document download CISO Corporate Security Structure www.bestitdocuments.com

Img
business , compliances , networking , visio-stencils , web-services

Simple Visio – Network Web (DMZ) Application Architecture drawing

March 14, 2012

Free – Visio Network Web (DMZ) Application Architecture  Document download Application Architecture drawing www.bestitdocuments.com

Img
application , business , compliances , networking , security , visio-stencils , web-services

Sample Visio – High Level Hyperion Topology Drawing

March 14, 2012

Free – Visio Document download Sample High Level Hyperion www.bestitdocuments.com

Img
compliances , security

Business Continuity

March 14, 2012

Business continuity is often one of those things that people don’t think about, or possibly one of those things that people don’t like to think about. The issue of business continuity exists because you just never know what might happen. Much like an insurance policy, your business continuity policies...

Img
business , compliances , security , visio-stencils

Sample Visio – Security Risk Management Considerations

March 13, 2012

Free – Visio Document download Security Risk Management Considerations www.bestitdocuments.com

Img
compliances , policies

Sample Word – Facilities Services Building Standards

March 12, 2012

Free Word document download Facilities Services Building Standards www.bestitdocuments.com

Img
compliances , security

Sample Word – NIST 800 Series Summarization

March 11, 2012

Free Word document download NIST 800 Series Summarization www.bestitdocuments.com

Img
compliances , firewalls , security , visio-stencils

Sample Visio – Firewall – VLAN Flows 1

March 10, 2012

Free – Visio Document download Firewall – VLAN Flows 1 www.bestitdocuments.com

Img
compliances , firewalls , security , visio-stencils

Sample Visio – Firewall – VLAN Flows 2

March 10, 2012

Free Visio document download Firewall – VLAN Flows 2 www.bestitdocuments.com

Img
compliances , security

Oracle hardening considerations

March 9, 2012

Disable install and demo accounts Disallow default user/password PUBLIC has execute System privilege PUBLIC has execute Object privilege PUBLIC has execute UTL_FILE privilege PUBLIC has execute UTL_SMTP privilege PUBLIC has execute UTL_HTTP privilege PUBLIC has execute UTL_TCP privilege PUBLIC has execute DBMS_RANDOM Password complexity Restrict number of failed login...

Img
application , compliances , web-services

Sample Word – SQL Service Response Time Considerations

March 8, 2012

Great information for a Storage Analyst or DBA analyst. SQL dba performance considerations. We would appreciate any backlinks you can create. Free Word document download SQL Service Response Time Considerations www.bestitdocuments.com

Img
application , compliances , o-s , policies , security , web-services

IT Operations and Maintenance and NIST standards that apply

March 7, 2012

IT Operations and Maintenance Review Operational Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-53A SP 800-100 Conducting Continuous Monitoring SP 800-53A SP 800-100 Conduct Re-Authorization SP 800-37 SP 800-53A Engineering and Development Controls SP 800-53 FIPS-200 www.bestitdocuments.com

Img
application , compliances , policies , security , web-services

Assessment descriptions and NIST standards that apply

March 7, 2012

Integrate Security into Established Environments SP 800-64 Certify System Security SP 800-37 SP 800-53A Test and Assess Security Controls SP 800-37 SP 800-53A Accredit System Security SP 800-37 Operation and Maintenance Readiness SP 800-70 SP 800-53A Perform Configuration Management SP 800-100 SP 800-53A Conduct Continuous Monitoring SP 800-100 SP...

Img
application , compliances , policies , security , web-services

SDLC Descriptions and NIST Standards that apply

March 6, 2012

SDLC Activity and supporting NIST publications NIST SP 800-64 Project Initiation – Security Planning SP 800-64 SP 800-100 SP 800-37 SP 800-53 Categorize Security for the System SP 800-60 FIPS-199 Assess Risk to a System SP 800-30 Analyze Risk Requirements SP 800-53 Assess Business Impact SP 800-34 Assess Policy...

Img
application , compliances , web-services

Sample of Application Support Management Services

March 4, 2012

When considering an Application Service Provider consider the understand that changes that are inevitable in any IT environment. Changes can happen in a business environment for many reasons; some key reasons are listed below: 1. Application Consolidation 2. Application Decommissioning etc. 3. Acquisitions 4. Divestiture 5. Down sizing Considering an Application Service Provider...

Img
compliances , sample-it-spreadsheets , security

Sample Excel – NIST – Security Test Evaluation Report spreadsheet

March 3, 2012

Hopefully this is helpful to you.. We appreciate your comments and would greatly appreciate your backlinks… thank you ! Certificate & Accreditation and Security Assessment Mapping to NIST Standards. Free – Document download Security Test Evaluation Report spreadsheet www.bestitdocuments.com

Img
compliances , o-s , security

System Log Events that should be logged

March 2, 2012

Therefore, logs shall be created whenever any of the following activities are requested to be performed by the system: Create, read, update, or delete confidential information, including confidential authentication information such as passwords; Create, update, or delete information not covered in above (1); Initiate a network connection; Accept a...

Img
application , compliances , security

Compliance – Audit Reporting Requirements (SOX, HIPAA, GLBA and PCI)

March 2, 2012

SOX, HIPAA, GLBA and PCI requirements: SOX Audit Reports User Logons Sec 302(a)(4)(C) and 302(a)(4)(D) require user accesses to the system, be recorded and monitored for possible abuse. User Logoffs Sec 302(a)(4)(C) and 302(a)(4)(D) require user accesses to the system, be recorded and monitored for possible abuse. Logon Failures...

Img
compliances , security , visio-stencils , web-services

Sample Visio Can your Business Analyst build this?

February 27, 2012

We are guessing not…. otherwise you would not be looking for this drawing…. This is nothing compared to what we have flowed out. See our site at: www.bestitdocuments.com Free Visio document download Download here…

Img
compliances , security

PowerPoint – Healthcare 360 – Excellent

February 26, 2012

I downloaded this from somewhere and could not find the link otherwise I would reference the link. Free – Document download It’s a good resource you should look at.  Download here. www.bestitdocuments.com

Img
compliances , networking , visio-stencils

Sample Visio – Technology Services Infrastructure Components

February 25, 2012

Free – Visio Document download Technology Services Infrastructure Components www.bestitdocuments.com

Img
compliances , o-s , security

Windows Level Certification Checklist

February 23, 2012

Window policy information for Account Information [ ] List Groups and Their Users [ ] List Users and Their Groups [ ] List Users and Their Rights [ ] List Users With Admin Privilege [ ] List Locked Out Accounts [ ] List Disabled Accounts [ ] List Expired...

Img
compliances , security , visio-stencils

Visio Sample – Human Resouce (HR) Procedures Interaction mapping

February 23, 2012

If you need to ask you don’t need this sample drawing. Free – Visio Document download Procedures Interaction mapping

Img
compliances , o-s , security , visio-stencils

Sample Visio – Active Direcotry Architecture Sample

February 23, 2012

Free – Visio Document download AD Architecture sample www.bestitdocuments.com

Img
compliances , security , web-services

Web Administration Sample Titles and Roles

February 21, 2012

Overview Sample Web server (Content Providers) and administrative Roles and Responsibilities Due to the nature of the Web Administrators and Content Providers roles, they sometimes need guidance to assure there is no confusion as to who is ultimately responsible for each task associated with the creation and/or maintenance of...

Img
application , compliances , networking

Great reference: NAT & Private IP Address Ranges

February 18, 2012

Great reference: NAT & Private IP Address Ranges

Img
compliances , itil , networking , security , visio-stencils

Sample Visio – Simple ITIL Security Operations Workflows

February 17, 2012

Simple sample Security Operations Workflows and interactions. In order to create a good IT operations runbook. This is the level of details that should be flowed out and documented step for step. Free – Visio Document download Visio Work Flows

Img
compliances , security

Sample – EPHI (HIPAA) – Administrative Technical Controls

February 16, 2012

Thank you for your visit. If you like what you have found on our site please backlink our site and blog. Standards Sections Description Security Management Process  § 164.308(a)(1) Risk Analysis Risk Management Sanction Policy Information System Activity Review Assigned Security Responsibility § 164.308(a)(2) Workforce Security § 164.308(a)(3) Authorization...

Img
compliances , security

Anatomy of a Web Application

February 16, 2012

Without any protection, holes and backdoors exist at every layer waiting to be exploited Each layer of the application has its own unique vulnerabilities. A vulnerability fixed at one layer may still be exploited at another layer. An exploit at any layer of the application effects the integrity and...

Img
compliances , security

Sample – EPHI (HIPAA) – Physical Technical Controls

February 15, 2012

Thank you for your visit. If you like what you have found on our site please backlink our site and blog. Standards Sections Description Facility Access Controls § 164.310(a)(1) Contingency Operations Facility Security Plan Access Control and Validation Procedures Maintenance Records Workstation Use § 164.310(b) Workstation Security § 164.310(c)...

Img
compliances , security

Sample – EPHI (HIPAA) – Technical Security Controls

February 15, 2012

Thank you for your visit. If you like what you have found on our site please backlink our site and blog. Standards Sections Description Access Control § 164.312(a)(1) Unique User Identification Emergency Access Procedure Automatic Logoff Encryption and Decryption Audit Controls § 164.312(b) Integrity § 164.312(c)(1) Mechanism to Authenticate...

Img