Policy Documentation

We Help You See the Forest Through The Trees

Complete Custom Solutions

The DevilDog Compliance Division specializes in creating customized documentation, policies, and procedures for numerous frameworks such as CMMC, NIST 800-171, HIPAA, GLBA, ISO 27001-2, etc. Our team is comprised of numerous subject matter experts including: engineers with military compliance backgrounds, industry recognized certifications, Masters' Degrees, and PhDs. Our collaborative team of project managers and security engineers works closely with your organization to develop and implement compliance documentation that meets the specific requirements of each framework. Our engineers and documentation team can implement a custom solution and meet most timelines for any industry or framework. Most of our solutions can be implemented in three to six months depending on framework and complexity.

All cyber-related insurance policies require proof and documentation of adherence to something. Companies without appropriate documentation will have their insurance claims denied.

Why do I need specific documentation?

We understand the complexities of compliance and help you navigate the regulatory landscape with ease. DevilDog Cybersecurity provides guidance on establishing a robust cybersecurity program tailored to your organization's needs as well as industry standards. Our goal is to assist you in identifying and addressing any gaps in your current cybersecurity practices and documentation.

With our knowledge of the latest regulatory changes, DevilDog Cybersecurity ensures that your compliance documentation remains up to date. We handle the process of documenting and evidencing compliance measures to satisfy certification auditors, ensuring a smooth certification journey for your organization.

Our team offers comprehensive training and support to help your employees understand and adhere to the compliance requirements. Additionally, DevilDog Cybersecurity can assist in the implementation and configuration of necessary technical controls and security measures to meet the compliance standards.

By staying current with emerging threats and evolving regulations, DevilDog Cybersecurity guarantees that your compliance documentation remains robust and effective. Our collaborative approach, combined with our expertise in delivering effective cybersecurity solutions, positions us as the go-to company for network security monitoring in the United States. Partner with DevilDog Cybersecurity to secure your business and achieve government-related cybersecurity certifications with confidence.

CyberSecurity Policy

  • Cyber Policy Development
  • Quantitative Risk Analysis
  • BCP – Business Continuity Planning
  • Maintenance
  • CMMI
  • Object Subject Classification
  • Protocol Development
  • Qualitative Risk Analysis
  • DRP – Disaster Recovery Planning
  • RACI
  • CNSSP – Committee on National Security Systems Policy
  • Attestation Reporting
  • Risk Mitigation
  • Certification
  • Common Criteria
  • RMF – Risk Management Frameworks
  • Risk Reporting
  • Accreditation
  • EAL – Evaluation Assurance Levels 1-7

Key Elements of a Security Policy

Access Control Policy (ACP)

The ACP states employee access to a firm’s information systems and data. Topics typically included in the policy are access control standards such as NIST’s Access Control and Implementation Guides. Additional subjects covered in this policy are standards for network access controls, user access, operating system software controls and the complexity of corporate passwords. Other items can include methods for monitoring how corporate systems are accessed and used; how unattended workstations should be secured; and how access is removed when an employee leaves the organization.

Acceptable Use Policy (AUP)

An AUP specifies the restrictions and practices that an employee using organizational IT assets must adhere to in order to access to the corporate network and/or the internet. It is standard on-boarding policy for all new personnel. They are given an AUP to read and sign before being granted network access. Your firm’s IT, legal, security, and HR divisions need to collaborate on what content is included in this policy.

Information Security Policy

An organization’s information security policies are high-level guidelines that can cover a large number of security controls. The principal Information Security Policy is issued by the firm to ensure that all employees who use information technology assets within the span of the company, or its networks, comply with its stated rules and guidelines.

Incident Response (IR) Policy

The Incident Response Policy is a firm’s methodology to how the company will manage an incident and remediate the effects. The objective of this plan is to describe the methodical process of handling an incident to minimize the damage to business operations, customers and decrease recovery time and overall cost.

Remote Access Policy

A Remote Access Policy is a plan that defines suitable methods of remotely connecting to a company’s networks. This policy is a requirement for organizations that have dispersed networks with the ability to extend into insecure network locations, such as hotels or unmanaged home networks.

Change Management Policy

A change management policy is the formal process for making changes to IT, software development and security services/operations. The objective of a change management program is to increase the awareness and understanding of proposed changes across a firm, and to ensure that all changes are conducted systematically to reduce any unfavorable impact on services and clients.

Email/Communication Policy

An Email/Communication Policy is deployed to formally state how employees can use electronic communication mediums, including email, blogs, social media and chat technologies. The objective of this policy is to provide rules to staff on what is considered the acceptable and unacceptable use of any company communication.

Disaster Recovery Policy

A Disaster Recovery Plan includes cybersecurity along with IT and is part of a much larger business continuity plan. The cybersecurity team will manage incidents through the Incident Response Policy. If an incident has significant impact, then the Business Continuity Plan will be deployed.

Business Continuity Plan (BCP)

A BCP coordinates actions across a firm. These actions will use the Disaster Recovery Plan to restore hardware, applications and essential data for business continuity. BCP’s are distinctive to every different business. A BCP explains how a company will operate in an emergency.