Our documents are based on successfully executed projects which save you time and money.
Img (719) 315-0404
compliances , policies , security

Intellectual Property Research

August 1, 2016

Intellectual Property Rights (IPR) currently presents considerable difficulties to the development and uptake of digital repositories of information objects. This project seeks to create practical DRM systems for digital repositories of information objects. The work of the project will be focusing on the real-world issues that people are encountering...

Img
application , business , o-s , security

UNIX – Home Directory Policy

May 12, 2016

Home Directory Construction Policy: Home directories must be constructed in accordance with the following guidelines: Each log-on account must have a unique home directory.  Every User must have their own individual account(s)  Every person’s user-ID must be associated with their home directory.  Only files unique to the user are...

Img
business , projects , security

Sample – Word – AIX Pre – Post Upgrade Checks

March 14, 2016

Word – AIX Pre – Post Upgrade Checks AIX_Pre_Post_Upgrade_Checks.doc  

Img
data-center-soc-noc , security , visio-stencils

Sample Visio – RSA ESI Servers

September 2, 2015

Free Visio document RSA ESI Servers  

Img
compliances , policies , security , visio-stencils

Sample Word – Visio RSA – ESI Event Source Integration

August 26, 2015

Sample Word and Vision document download RSA – ESI Event Source Integration    

Img
compliances , policies , security

Sample Word – Regulation and compliance log retention best practices

August 6, 2015

Free word document downloads The Basel II Accord, FISMA, GLBA, HIPAA, NERC NISPOM, PCI SOX EU  

Img
sample-it-spreadsheets , security

Sample Excel – Qualys Scanner Assignment Tracking

July 27, 2015

Free Excel Document download Qualys Scanner Assignment Tracking  

Img
sample-it-spreadsheets , security

Sample Excel – Qualys Remediation Tracking

July 24, 2015

Free Excel document download Qualys Remediation Tracking  

Img
compliances , health-care-hipaa-hitech-hitech , policies , security

McKesson Information Solutions

July 20, 2015

McKesson produces many Healthcare applications including Series 2000, STAR, Care Manager and Image Manager. There are many more applications in their portfolio, but these are the prime applications that we find at healthcare facilities when we present eTrust Single Sign-on and Admin. Each of these applications incorporates their own...

Img
compliances , policies , security

Sample Word – How does x.509 differ from PGP?

July 18, 2015

Free Word document download How does x.509 differ from PGP?

Img
compliances , security

QualysGuard Assigning Asset Owners

April 8, 2015

All assets must have an owner assigned that is responsible for remediating any vulnerabilities found on the system. In most cases, the owner information is tracked by IPControl. To assign asset owners, click on the Host Assets button in the Tools Pane on the left of the QualysGuard application....

Img
compliances , security

Qualys Remediation Procedures

March 14, 2015

Backround: Qualys provides online asset management and ticketing tools that can be used to track remediation efforts by various internal IT teams to keep IT assets patched and up to date. These procedures apply to all scanning activity, whether it be for SOX, PCI or weekly scans. Qualys remediation...

Img
compliances , security

Qualys Tickets

February 28, 2015

The primary way to track remediation in Qualys is by using it’s built in ticketing system. You can prioritize and fix vulnerabilities using recommended solutions, such as patches and workarounds, which are provided in scan reports. Remediation workflow allows users to manage vulnerabilities through remediation tickets. Each ticket corresponds...

Img
compliances , networking , security

Sample – Network UAT Change Policy

January 29, 2015

Network Services is requiring User Acceptance Testing (UAT) on all high risk/high impact changes and/or changes that will result in a known impact or system degradation. The risk scoring of the change is based on information entered in the change record as well as the Enterprise model used for...

Img
policies , security

Sample Word – Physical Data Center Local Recovery Considerations

January 28, 2015

Free Word document download Physical Data Center Local Recovery Considerations

Img
compliances , security , visio-stencils

How to create Unit Managers in Qualys for Remediation Management

January 26, 2015

Background: In order to remediate vulnerabilities found, all assets must have an identified asset owner who will work to either fix the vulnerabilities or route the issue to someone who will. Persons who will remediate assets are called “Unit Managers.” This document outlines how to setup an individual as...

Img
compliances , security

Qualys Business Units

January 25, 2015

Management and Remediation Introduction Per regulatory compliance, Information Security team conducts periodic vulnerability assessment (VA) scans on all Symantec internal networks. Business units in QualysGuard are used to delegate remediation responsibilities. If you are a business unit manager, please follow these instructions for assistance on managing your business unit....

Img
compliances , security

Sample Word – DBMS Data Security Standard

January 14, 2015

Free Word document download DBMS Data Security Standard

Img
information-rights-management , security

Sample Word – Courion to Remedy Functional Interface Requirements

January 13, 2015

Free Word document download Courion to Remedy Functional Interface Requirements

Img
compliances , information-rights-management , security

Sample Word – IdM Curion Professional Services Design Document

January 12, 2015

Sample Word document download IdM Curion Professional Services Design Document  

Img
policies , security , visio-stencils

Major aspects of Information Protection Requirements

January 8, 2015

There are a number of other potential resources providing additional direction. Overview Data Protection Begins with You Data Security Classifications Securing Your Work Area and Connection Securing Information in a Mobile Environment Electronic Communications and Mail Social Engineering Social Media Reporting Security Incidents Home

Img
compliances , security

Corporate Security – Awareness

January 6, 2015

Protecting customers, clients this overview provides you with the direction you need when it comes to protecting information. This is the basics of the Global Information Security Standards and Policies, and the Enterprise Electronic Communications and Social Media Policies for Corporate which includes: Identifying the purpose of information protection...

Img
compliances , sample-it-spreadsheets , security

Sample Excel – Data Classification Quick Reference

January 2, 2015

Free Excel document download Data Classification Quick Reference  

Img
compliances , sample-it-spreadsheets , security

Sample Excel – Data Classification Quick Reference Matrix

January 1, 2015

Free excel document download Data Classification Quick Reference Matrix  

Img
security

Password Cracking Testing

December 27, 2014

Password cracking is the process of validating password strength through the use of automated password recovery tools that expose either the application of weak cryptographic algorithms, incorrect implementation of cryptographic algorithms, or weak passwords due to human factors. This module should not be confused with password recovery via sniffing...

Img
policies , sample-it-spreadsheets , security

Sample Excel – Guardium Access Monitoring Deployment

December 24, 2014

Free Excel document download Guardium Access Monitoring Deployment www.bestitdocuments.com

Img
data-center-soc-noc , networking , security , visio-stencils

Sample Visio – Bluecoat Proxy Stencils

December 20, 2014

Free Visio document download BlueCoat VisioStencils www.bestitdocuments.com

Img
compliances , security

Enterprise Integration Service Considerations

December 16, 2014

Challenges for your business… How do you guarantee suitable infrastructure at all locations? How do you handle the design, deployment and integration of new technologies into your global network global network? How do manage the deployment of new technology across thousands of miles, customs barriers, language differences and local...

Img
compliances , itil , security

What is key about ITIL and a Life Cycle approach

December 11, 2014

Improved quality, cost, value and effectiveness of IT Improved IT Productivity Improved IT Services Managed expectations Improved Customer Satisfaction Reduce Operating costs Overall: Organizations can clearly align themselves with the business by agreeing on a service portfolio that describes what customers use, in business language. A strategic lifecycle framework...

Img
health-care-hipaa-hitech-hitech , security

Sample – Clinical Vendor Proof of Concept Criteria

December 8, 2014

Understand Clinical workflows Understand the emphasis on Security User enrollment , provisioning / de-provisioning (integration with Active Directory) Password management (self service) Auditing / reporting Flexible and strong two factor authentication Vendor Capacities  Viability (longevity, experience, financials, market standing) Product Ease of use, Ease of maintenance / customer support...

Img
compliances , policies , security

Protecting your Customers Online and Offline

November 20, 2014

Objectives are to: Identify the purpose of importance of information protection for Corporate and customers. Identify the use and purpose of data security classifications. Identify the components of a strong passwords. Identify how to access, store and destroy data properly. Identify the appropriate security management of electronic communications. Recognize...

Img