Your data doesn't train Genie's AI
You keep IP ownership of your docs
1. Policy Statement: High-level statement of the organization's commitment to cyber resilience and information security
2. Purpose and Scope: Defines the objectives of the policy and its application scope within the organization
3. Definitions: Detailed definitions of technical terms, acronyms, and key concepts used throughout the policy
4. Roles and Responsibilities: Defines key roles and their responsibilities in maintaining cyber resilience
5. Risk Assessment and Management: Framework for identifying, assessing, and managing cyber security risks
6. Security Controls and Requirements: Core security controls covering access management, network security, data protection, and system security
7. Data Classification and Handling: Guidelines for classifying and handling different types of data based on sensitivity
8. Incident Response and Reporting: Procedures for detecting, responding to, and reporting security incidents
9. Business Continuity and Disaster Recovery: Procedures for maintaining operations during and after cyber incidents
10. Compliance and Audit: Requirements for compliance monitoring, auditing, and regulatory reporting
11. Training and Awareness: Requirements for cyber security awareness training and skill development
12. Review and Updates: Process for periodic review and updating of the policy
1. Cloud Security Controls: Specific controls for cloud services usage and management, required for organizations using cloud services
2. Remote Work Security: Security requirements for remote working arrangements, needed if organization supports remote work
3. IoT Device Security: Controls for Internet of Things devices, required for organizations using IoT technology
4. Third-Party Risk Management: Guidelines for managing cyber risks from third-party vendors and partners
5. Industry-Specific Controls: Additional controls required for specific industries (e.g., healthcare, financial services)
6. International Data Transfer: Procedures for secure international data transfers, needed if operating globally
7. Mobile Device Management: Specific controls for mobile devices, required if organization has BYOD or mobile device policy
8. DevSecOps Requirements: Security requirements for development processes, needed for organizations developing software
1. Schedule A - Technical Security Standards: Detailed technical specifications for security controls and configurations
2. Schedule B - Incident Response Procedures: Detailed step-by-step procedures for different types of security incidents
3. Schedule C - Risk Assessment Matrix: Detailed risk assessment criteria and evaluation framework
4. Schedule D - Data Classification Guidelines: Detailed criteria for data classification and handling requirements
5. Schedule E - Security Monitoring and Logging Requirements: Specific requirements for security monitoring, log maintenance and retention
6. Schedule F - Compliance Checklist: Detailed compliance requirements and verification checklist
7. Appendix 1 - Security Forms and Templates: Standard forms for security assessments, incident reports, and audits
8. Appendix 2 - Contact Information: Emergency contacts, incident response team, and key stakeholders
9. Appendix 3 - Technology Stack Security Requirements: Security requirements specific to the organization's technology stack
Find the exact document you need
Information Security Risk Assessment Policy
A comprehensive information security risk assessment framework aligned with Indian regulatory requirements and international best practices.
Cyber Resilience Policy
An internal policy document establishing cyber security and resilience measures in compliance with Indian cyber security laws and regulations.
Genie’s Security Promise
Genie is the safest place to draft. Here’s how we prioritise your privacy and security.
Your documents are private:
We do not train on your data; Genie’s AI improves independently
All data stored on Genie is private to your organisation
Your documents are protected:
Your documents are protected by ultra-secure 256-bit encryption
We are ISO27001 certified, so your data is secure
Organizational security:
You retain IP ownership of your documents and their information
You have full control over your data and who gets to see it
