One Hour Security Polices

Security Bastion services and products combine actionable wisdom and relevant implementation advice embedded in security templates that cover the full range of information security controls…. Security Bastion’s security templates are comprehensive and wide ranging with hundreds of policy and standard statements covering every aspect of information security.

Read more

Don’t Make Yourself A Target

Don’t make yourself a target – get premium quality information security templates written by CISSP certified security professionals. Catapult your organization to a high level of security by utilizing CISSP security professionals and the vast working knowledge of the International Standards Organization Code of Practice for Information Security Management (ISO 27002). Security Bastion`s security templates […]

Read more

Policy Development Costs

Typical cost of developing an information security policy Below we have set out the costs for developing one complete information security policy with a length of 100 pages. Our service provides access to thousands of pages of not only policies but standards, processes and more. Ideally a technical writer and information security professional would be […]

Read more

Security Policy Development Process

The following Information Security Policy Development Process is designed to offer a speedy breakdown of the most important actions of this particular development, refinement, and acceptance associated with a company information security policy document. Many of the following steps can be pursued simultaneously or perhaps in an order distinct from the next: Perform a risk […]

Read more

Policy Samples

Policy samples can be used to assist an organisation’s own policy development efforts. Writing an information security policy is a very difficult and arduous task. If you are unaccustomed to it you may find it frustrating and confusing. Many organisations have a standard set of organisational policies that govern the way the business is performed. […]

Read more

Security Policy Examples

Security Bastion provides First-class policy examples helping organisations quickly and effectively generate their own information security policy framework based on industry best practices today. One should consider that securing an organisation and its information assets is not just about picking and choosing technical security controls. We have met many so-called information security professionals who can […]

Read more

Security Policy Templates

Security Bastion provides first-class Information security policy templates for organizations wishing to create new or restructure their existing Information security policy Framework. An Information security policy is a special form of documented business rules directed from senior management. Clearly there was no requirement for them 40 years back. The surge of information-processing systems such as […]

Read more

Procedure Template

Procedures are very unique, in fact they are unique as the organization they are placed in. Unfortunately there is no generally accepted standard for the correct way to produce a good procedure. The main factor that will determine how your developed procedures will look will be how your current procedures templates are designed for your […]

Read more

Why Identity and credit card theft drives regulatory compliance

Identity and credit card theft are becoming increasingly major problems for organisations to deal with year over year. These types of criminal activity have predated the Internet, with the ironic truth that tools which are designed to improve business efficiency also make criminal activity more convenient and efficient. High-tech criminals and increasingly criminal organisations have […]

Read more

Risk Management Policy

A risk management policy should be in support of the organizations mission and deliverable, and should be ratified by executive management and based on high priority. The risk management policy statements should place a very high priority on managing organizational risk both strategically and systematically. This policy will be the catalyst for all other risk […]

Read more