DOWNLOADABLE List of Documents in the Toolkit

Page 1

Cyber Essentials Toolkit Version 3 AREA

DOC REF

DOCUMENT

0. Implementation Resources

None None None CYB-DOC-00-1 CYB-DOC-00-2 CYB-DOC-00-3 CYB-DOC-00-4 CYB-DOC-00-5 CYB-DOC-00-6 CYB-DOC-00-7 CYB-DOC-00-8 CYB-FORM-00-1 CYB-FORM-00-2

ATTENTION READ ME FIRST Toolkit Completion Instructions CERTIKIT Cyber Essentials Toolkit Implementation Guide CERTIKIT Cyber Essentials Overview CERTIKIT Cyber Essentials Toolkit Index Cyber Essentials Evidence Documentation Log Project Definition Cyber Essentials Project Plan Information Security Policy Awareness Training Presentation Acceptable Use Policy Remote Working Policy Gap Assessment Tool Progress Report

1. Office Firewalls and Internet Gateways

CYB-DOC-01-1 CYB-DOC-01-2 CYB-FORM-01-1 CYB-FORM-01-2 CYB-FORM-01-3 None None

Network Security Policy Firewall Rule Removal Process Firewall Configuration Standard Firewall Rule Change Log Firewall Review Form EXAMPLE Firewall Configuration Standard Network Diagram Example

2. Secure Configuration

CYB-DOC-02-1 CYB-DOC-02-2 CYB-DOC-02-3 CYB-DOC-02-4 CYB-DOC-02-5 CYB-DOC-02-6 CYB-DOC-02-7 CYB-DOC-02-8 CYB-DOC-02-9 CYB-FORM-02-1 None None None

Logging and Monitoring Policy Software Policy Mobile Device Policy Backup Policy Cloud Computing Policy Password Policy Hardware Inventory Configuration Standard BYOD Policy Configuration Specification EXAMPLE Configuration Specification EXAMPLE Configuration Standard EXAMPLE Hardware Inventory

3. User and Administrative Accounts

CYB-DOC-03-1 CYB-DOC-03-2 CYB-DOC-03-3 CYB-DOC-03-4 CYB-DOC-03-5 CYB-DOC-03-6 CYB-DOC-03-7 None None None

Access Control Policy Internet Acceptable Use Policy User Access Management Process Cryptographic Policy Physical Security Policy System Owners Admin User Accounts Cyber Essentials Poster - Passwords EXAMPLE Admin User Accounts EXAMPLE System Owners

4. Malware Protection

CYB-DOC-04-1 CYB-DOC-04-2 CYB-DOC-04-3 None

Anti-Malware Policy Electronic Messaging Policy Incident Response Plan Ransomware Cyber Essentials Poster - Phishing

5. Software Patching

CYB-DOC-05-1 CYB-DOC-05-2 None

Patch Management Policy Software Inventory EXAMPLE Software Inventory

04/10/2021

Page 1 of 1


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.