Unlock full cybersecurity compliance with a combined SME+Enterprise policy pack: 74 mapped, audit-ready documents for ISO 27001, GDPR, NIS2, DORA, and more.
This policy combo merges SME and Enterprise packs to deliver a scalable, audit-ready set of 74 cybersecurity policies, fully mapped to ISO/IEC 27001, GDPR, NIS2, DORA, NIST and COBIT, ensuring compliance for organizations of any size or complexity.
Mandates version control, exception logs, risk treatments, and audit trails for easy certification and external audits.
Mapped to ISO/IEC 27001:2022, GDPR, NIS2, DORA, NIST, and COBIT standards for SMEs and enterprises alike.
Includes policies for General Manager-led SMEs and cross-functional enterprise teams, no gaps, clear responsibilities.
Covers IT, Security, Risk, Legal, Compliance, Audit, HR, and Operations across business sizes and sectors.
Scope and Rules of Engagement
Roles and Responsibilities Matrix
Audit, Legal & Regulatory Compliance Processes
Access and Change Control Procedures
Data Protection and Privacy Rules
Incident Response and Evidence Handling
This product is aligned with the following compliance frameworks, with detailed clause and control mappings.
Framework | Covered Clauses / Controls |
---|---|
ISO/IEC 27001:2022 | |
ISO/IEC 27002:2022 | |
NIST SP 800-53 Rev.5 |
AC-1AC-2AC-4AC-5AC-6AC-8AC-17AC-19AU-2AU-6AU-8AU-9AU-12BAI03BAI05BAI07CA-1CA-2CA-3CA-5CA-7CM-2CM-5CM-6CP-1CP-2CP-4CP-9CP-10DSS01DSS02DSS04DSS05DSS06IA-1IA-2IA-4IA-5IR-1IR-4IR-5IR-6IR-9MEAO1MEA03MP-5MP-6PL-1PL-2PL-4PL-8PM-1PM-5PM-11PM-13PM-21PM-23PS-4PS-5PS-7PT-2PT-3RA-3RA-5R-1SA-3SA-4SA-9SA-9(5)SA-10SA-11SA-15SC-7SC-12SC-12(3)SC-13SC-17SC-28SC-28(1)SC-32SC-45SI-2SI-3SI-4SI-10SR-3SR-5
|
EU GDPR |
Article 5Article 6Articles 12–23Article 17Article 24Article 25Article 28Article 30Article 32Article 33Article 34Article 39Recital 39Recital 49Recital 78
|
EU NIS2 Directive |
Article 15Article 20Article 21Article 21(2)Article 21(3)Article 23Article 27
|
EU DORA | |
COBIT 2019 | |
ISO 31000:2018 |
Leadership commitmentRisk management principlesContinuous improvement
|
ISO/IEC 27005:2024 |
Context EstablishmentRisk IdentificationRisk AnalysisRisk EvaluationRisk TreatmentRisk AcceptanceRisk CommunicationRisk Monitoring and Review
|
ISO 22301:2019 |
Business Continuity Management SystemBusiness Impact AnalysisRequirements
|
This policy establishes the organization's approach to performing internal audits, security control checks, and regulatory compliance monitoring.
This policy defines how governance responsibilities for information security are assigned, delegated, and managed in the organization to ensure full compliance with ISO/IEC 27001:2022 and other regulatory obligations.
This policy establishes enforceable guidelines for maintaining a secure working environment by ensuring that desks, workstations, and display screens are kept free of visible confidential information when unattended.
This policy defines the minimum technical, procedural, and behavioral requirements for protecting all endpoint devices—such as laptops, desktops, mobile devices—from malicious code.
This policy demonstrates our organization’s commitment to protecting customer and business information by clearly defining responsibilities and practical security measures.
This policy defines the acceptable, responsible, and secure use of company-provided systems, devices, internet access, email, cloud services, and any personally owned devices used for business.
This policy defines how the organization manages access to systems, data, and facilities to ensure that only authorized individuals can access information based on business need.
This policy ensures that all changes to IT systems, configurations, business applications, or cloud services are planned, risk-assessed, tested, and approved before implementation.
This policy defines how the organization identifies, evaluates, and manages risks related to information security, operations, technology, and third-party services.
This policy defines the process for onboarding new employees or contractors and securely removing access when individuals leave or change roles.
This policy ensures that all employees and contractors understand their responsibilities regarding information security.
This policy establishes security requirements for employees and contractors working remotely, including from home, shared workspaces, or while traveling.
This policy establishes rules for managing user accounts and access rights in a secure, consistent, and traceable manner.
This policy defines how the organization identifies, tracks, protects, and retires its information assets, including both physical and digital components.
This policy defines how all information handled by the organization must be classified and labeled to ensure its confidentiality, integrity, and availability.
The purpose of this policy is to define enforceable rules for the retention and secure disposal of information.
This policy defines how the organization performs and manages backups to ensure business continuity, protect against data loss, and enable timely recovery from incidents.
This policy defines enforceable requirements for the use of data masking and pseudonymization to protect sensitive, personal, and confidential data.
This policy defines how the organization protects personal data in line with legal obligations, regulatory frameworks, and international security standards.
This policy defines mandatory requirements for the use of encryption and cryptographic controls to protect the confidentiality, integrity, and authenticity of business and personal data.
This policy defines how the organization identifies, evaluates, and mitigates vulnerabilities across systems, applications, and infrastructure.
The purpose of this policy is to ensure that all internal and external network communications are protected against unauthorized access, tampering, eavesdropping, or misuse.
This policy establishes mandatory logging and monitoring controls to ensure the security, accountability, and operational integrity of the organization’s IT systems.
This policy establishes mandatory controls for maintaining accurate, synchronized time across all systems that store, transmit, or process data.
This policy ensures that all software, scripts, and web-based tools are developed securely, minimizing the risk of vulnerabilities.
This policy defines the minimum mandatory application security controls required for all software and system solutions used by the organization.
This policy establishes the mandatory security requirements for engaging, managing, and terminating relationships with third parties and suppliers.
This policy defines how cloud services may be used securely within the organization.
This policy ensures that all outsourced software development is conducted securely, contractually controlled, and aligned with applicable legal and regulatory requirements.
This policy defines how test data and test environments must be managed to prevent accidental exposure, data breaches, or operational disruptions during testing.
This policy defines how the organization detects, reports, and responds to information security incidents affecting digital systems, data, or services.
This policy defines how the organization handles digital evidence related to security incidents, data breaches, or internal investigations.
This policy ensures the organization can maintain business operations and recover essential IT services during and after disruptive events.
This policy defines the mandatory security requirements for using mobile devices when accessing company information, systems, or services.
This policy defines the mandatory rules for securely using and managing Internet of Things (IoT) and Operational Technology (OT) devices within the organization.
This policy establishes mandatory guidelines for all public-facing communication—including social media use, press engagement, and external digital content—when referencing the company, its personnel, clients, systems, or practices.
This policy defines the organization's approach to identifying, complying with, and demonstrating adherence to legal, regulatory, and contractual obligations.
Effective security governance requires more than just words; it demands clarity, accountability, and a structure that scales with your organization. Generic templates often fail, creating ambiguity with long paragraphs and undefined roles. This policy is engineered to be the operational backbone of your security program. We assign responsibilities to the specific roles found in a modern enterprise, including the CISO, IT Security, and relevant committees, ensuring clear accountability. Every requirement is a uniquely numbered clause (e.g., 5.1.1, 5.1.2). This atomic structure makes the policy easy to implement, audit against specific controls, and safely customize without affecting document integrity, transforming it from a static document into a dynamic, actionable framework.
This policy was authored by a security leader with 25+ years of experience deploying and auditing ISMS frameworks for global enterprises. It's designed not just to be a document, but a defensible framework that stands up to auditor scrutiny.