Need support?

We provide all companies a library of cybersecurity reference documents. These documents are templates of policies, inventories, instructions, ... and are aligned with the CyberFundamentals Assurance Level "Basic". Their objective is to allow you to quickly and easily implement a cybersecurity policy in your organisation. Each model can be freely adapted, completed and customised according to your needs.

Image
policy_templates
Read more : Asset management , the link will open in a new tab.
asset management policy template

Asset management

An asset management policy provides a structured framework for managing an organisation's assets to optimise performance, ensure compliance, and maximise value over the asset lifecycle. It outlines principles, responsibilities, and procedures to guide asset-related decision-making and resource allocation.

Download 

Read more : Password policy , the link will open in a new tab.
policy template on password policy

Password policy

Passwords are often used to authenticate users. This document provides a policy on the use and implementation of passwords for confidential and critical information systems.

Download 

Read more : 10 golden rules for cybersecurity , the link will open in a new tab.
10goldenrulescubersecity

10 golden rules for cybersecurity

These 10 golden rules give a brief overview of what an organisation can consider to start communication and implementation around cyber security.

Download 

Read more : Cybersecurity Policy , the link will open in a new tab.
cybersecurity policy

Cybersecurity Policy

This Cybersecurity Policy defines the minimum requirements applicable to all departments within the organisation so that we protect one's intellectual property, commercial advantage and people from the consequences of poor Information Security and possible cyber-attacks.

Download 

Read more : Access policy
accesspolicy

Access policy

Within an organisation, access management is an essential part of security that determines who has access to certain data, applications and other digital assets, and under what circumstances. This access management policy secures digital environments in the same way keys and guest lists secure physical spaces. It allows the organisation to verify that users are who they say they are, and that these users have been granted appropriate access, based on context such as device, location, function and more.

Download 

Read more : Vulnerability and patch management , the link will open in a new tab.
vulnerabilityandpatchmanagement

Vulnerability and patch management

A vulnerability is a flaw or weakness, a design or implementation error, lack of updates in the light of existing technical knowledge, that can compromise the security of information technologies. A vulnerability can lead to an unexpected or unwanted event and be exploited by malicious third parties to violate the integrity, authenticity, confidentiality or availability of a system or to damage a system.  Therefore, it is vital that we eliminate as many known vulnerabilities as possible. For this, we need a good patch management system and vulnerability monitoring.

Download 

Read more : Network security policy , the link will open in a new tab.
networksecuritypolicy

Network security policy

Network security within the organisation is important because it is your first defence against outside attacks. By implementing effective technical and organisational network security measures, you can prevent cybercriminals from mapping your infrastructure, disrupting your communications, unlawfully gathering data or reaching critical applications and devices.

Download 

Read more : Cyber incident response plan , the link will open in a new tab.
CIRP

Cyber incident response plan

This document contains guidelines and examples that organisations can follow to support the development of their own Cyber Incident Response Plan (CIRP). The template is not exhaustive. Each organisation's CIRP should be tailored to its unique operating environment, priorities, resources and constraints.

Download 

Read more : Backup and restore policy , the link will open in a new tab.
backup_and_restore_policy

Backup and restore policy

Critical information and information systems must be protected against data loss and data damage. Backup and recovery procedures enable us to restore information in case of disaster scenarios.  This policy provides organisations with some tools to develop a sound backup strategy.

Download 

Other files

Read more : CyFun® definitions , the link will open in a new tab.
SVG

CyFun® definitions

The definitions of the main terms used in the CyFun® Framework.

Download 

Read more : CyFun® mapping , the link will open in a new tab.
SVG

CyFun® mapping

The mapping provides an overview of the requirements and links with other frameworks in a MS Excel-format.

Download