Comprehensive SME cybersecurity policy set aligned with ISO/IEC 27001, GDPR, NIS2, and more. Practical, audit-ready controls for small business compliance.
The Full SME Pack (P01S-P37S) provides a complete, audit-ready set of cybersecurity and IT governance policies covering all SME information security requirements. Every policy is adapted for small business leaders (General Managers), explicitly designed for organizations without dedicated security teams, and is fully aligned with ISO/IEC 27001:2022, GDPR, NIS2, DORA, and more.
Covers 37 policies, ensuring full alignment with ISO/IEC 27001, GDPR, NIS2, DORA, and COBIT for SMEs without large IT teams.
All policies include audit documentation requirements, version control, review triggers, and corrective action processes.
Roles mapped to General Manager and team leads, no CISO/SOC required. Designed for owner-managed businesses.
Step-by-step rules, checklists, and exception handling for user-friendly, enforceable cybersecurity practices.
Direct mapping to all ISO/IEC 27001:2022 and 27002:2022 clauses for audit and certification confidence.
Scope and Rules of Engagement
Roles and Responsibilities Matrix
Access and Change Control Procedures
Data Protection and Privacy Rules
Incident Response and Evidence Handling
Audit, Legal & Regulatory Compliance Processes
This product is aligned with the following compliance frameworks, with detailed clause and control mappings.
Framework | Covered Clauses / Controls |
---|---|
ISO/IEC 27001:2022 | |
ISO/IEC 27002:2022 | |
NIST SP 800-53 Rev.5 | |
EU GDPR |
Article 5Article 6Articles 12–23Article 28Article 32Article 33Article 34
|
EU NIS2 Directive |
Article 20Article 21(2)(a–i)Article 23
|
EU DORA | |
COBIT 2019 |
This policy defines how governance responsibilities for information security are assigned, delegated, and managed in the organization to ensure full compliance with ISO/IEC 27001:2022 and other regulatory obligations.
This policy establishes enforceable guidelines for maintaining a secure working environment by ensuring that desks, workstations, and display screens are kept free of visible confidential information when unatended.
This policy defines the minimum technical, procedural, and behavioral requirements for protecting all endpoint devices—such as laptops, desktops, mobile devices, and portable media—from malicious code.
This policy demonstrates our organization’s commitment to protecting customer and business information by clearly defining responsibilities and practical security measures, suitable for organizations without dedicated IT teams.
This policy defines the acceptable, responsible, and secure use of company-provided systems, devices, internet access, email, cloud services, and any personally owned devices used for business.
This policy defines how the organization manages access to systems, data, and facilities to ensure that only authorized individuals can access information based on business need.
This policy ensures that all changes to IT systems, configurations, business applications, or cloud services are planned, risk-assessed, tested, and approved before implementation.
This policy defines how the organization identifies, evaluates, and manages risks related to information security, operations, technology, and third-party services.
This policy defines the process for onboarding new employees or contractors and securely removing access when individuals leave or change roles.
This policy ensures that all employees and contractors understand their responsibilities regarding information security.
This policy establishes security requirements for employees and contractors working remotely, including from home, shared workspaces, or while traveling.
This policy establishes rules for managing user accounts and access rights in a secure, consistent, and traceable manner.
This policy defines how the organization identifies, tracks, protects, and retires its information assets, including both physical and digital components.
This policy defines how all information handled by the organization must be classified and labeled to ensure its confidentiality, integrity, and availability are maintained throughout its lifecycle.
The purpose of this policy is to define enforceable rules for the retention and secure disposal of information within an SME environment.
This policy defines how the organization performs and manages backups to ensure business continuity, protect against data loss, and enable timely recovery from incidents.
This policy defines enforceable requirements for the use of data masking and pseudonymization to protect sensitive, personal, and confidential data within small and mid-sized enterprises (SMEs).
This policy defines how the organization protects personal data in line with legal obligations, regulatory frameworks, and international security standards.
This policy defines mandatory requirements for the use of encryption and cryptographic controls to protect the confidentiality, integrity, and authenticity of business and personal data.
This policy defines how the organization identifies, evaluates, and mitigates vulnerabilities across systems, applications, and infrastructure.
The purpose of this policy is to ensure that all internal and external network communications are protected against unauthorized access, tampering, eavesdropping, or misuse by clearly defined security controls.
This policy establishes mandatory logging and monitoring controls to ensure the security, accountability, and operational integrity of the organization’s IT systems.
This policy establishes mandatory controls for maintaining accurate, synchronized time across all systems that store, transmit, or process organizational data.
This policy ensures that all sotiware, scripts, and web-based tools created or modified by the organization or its external partners are developed securely, minimizing the risk of vulnerabilities.
This policy defines the minimum mandatory application security controls required for all sotiware and system solutions used by the organization, regardless of whether they are developed internally or procured from external vendors.
This policy establishes the mandatory security requirements for engaging, managing, and terminating relationships with third parties and suppliers who access or influence the organization’s data, systems, or services.
This policy defines how cloud services may be used securely within the organization. It ensures that data processed or stored in the cloud is protected, access is controlled, and risks are managed responsibly.
This policy ensures that all outsourced sotiware development—whether handled by freelancers, agencies, or third-party providers—is conducted securely, contractually controlled, and aligned with applicable legal, regulatory, and audit requirements.
This policy defines how test data and test environments must be managed to prevent accidental exposure, data breaches, or operational disruptions during testing activities.
This policy defines how the organization detects, reports, and responds to information security incidents affecting its digital systems, data, or services.
This policy defines how the organization handles digital evidence related to security incidents, data breaches, or internal investigations.
This policy ensures the organization can maintain business operations and recover essential IT services during and atier disruptive events.
This policy establishes the organization's approach to performing internal audits, security control checks, and regulatory compliance monitoring.
This policy defines the mandatory security requirements for using mobile devices—including smartphones, tablets, and laptops—when accessing company information, systems, or services.
This policy defines the mandatory rules for securely using and managing Internet of Things (IoT) and Operational Technology (OT) devices within the organization.
This policy establishes mandatory guidelines for all public-facing communication — including social media use, press engagement, and external digital content — when referencing the company, its personnel, clients, systems, or internal practices.
This policy defines the organization's approach to identifying, complying with, and demonstrating adherence to legal, regulatory, and contractual obligations.
Generic security policies are often built for large corporations, leaving small businesses struggling to apply complex rules and undefined roles. This policy is different. Our SME policies are designed from the ground up for practical implementation in organizations without dedicated security teams. We assign responsibilities to the roles you actually have, like the General Manager and your IT Provider, not an army of specialists you don't. Every requirement is broken down into a uniquely numbered clause (e.g., 5.2.1, 5.2.2). This turns the policy into a clear, step-by-step checklist, making it easy to implement, audit, and customize without rewriting entire sections.
This policy was authored by a security leader with 25+ years of experience deploying and auditing ISMS frameworks for global enterprises. It's designed not just to be a document, but a defensible framework that stands up to auditor scrutiny.