DOWNLOADABLE List of Documents in the Toolkit

Page 1

Cyber Essentials Toolkit Version 5

0. Implementation Resources

None ATTENTION READ ME FIRST Toolkit Completion Instructions

None CERTIKIT Cyber Essentials Toolkit Implementation Guide

None CERTIKIT Cyber Essentials Overview CERTIKIT Cyber Essentials Toolkit Index

None CERTIKIT Standard Licence Terms

CYB-DOC-00-1 Cyber Essentials Evidence

CYB-DOC-00-2 Documentation Log

CYB-DOC-00-3 Project Definition

CYB-DOC-00-4 Cyber Essentials Project Plan

CYB-DOC-00-5 Information Security Policy

CYB-DOC-00-6 Awareness Training Presentation

CYB-DOC-00-7 Acceptable Use Policy

CYB-DOC-00-8 Remote Working Policy

CYB-FORM-00-1 Gap Assessment Tool

CYB-FORM-00-2 Progress Report Cyber Essentials Requirements for Infrastructure v3r1 January 2023

CYB-DOC-01-1 Network Security Policy

CYB-DOC-01-2 Firewall Rule Change Process

CYB-FORM-01-1 Firewall Configuration Standard

CYB-FORM-01-2 Firewall Rule Change Log

CYB-FORM-01-3 Firewall Review Form

None EXAMPLE Firewall Configuration Standard

None Network Diagram Example

CYB-DOC-02-1 Logging and Monitoring Policy

CYB-DOC-02-2 Software Policy

CYB-DOC-02-3 Mobile Device Policy

CYB-DOC-02-4 Backup Policy

CYB-DOC-02-5 Cloud Computing Policy

CYB-DOC-02-6 Password Policy

CYB-DOC-02-7 Hardware Inventory

CYB-DOC-02-8 Configuration Standard

CYB-DOC-02-9 BYOD Policy

CYB-DOC-02-10 Cloud Services Register

CYB-DOC-02-11 Configuration Management Policy

CYB-DOC-02-12 Asset Management Policy

CYB-FORM-02-1 Configuration Specification

CYB-FORM-02-2 Cloud Services Questionnaire

None EXAMPLE Configuration Specification

None EXAMPLE Configuration Standard

None EXAMPLE Hardware Inventory

None EXAMPLE Cloud Services Register

CYB-DOC-04-1

CYB-DOC-04-2

CYB-DOC-04-3

CYB-DOC-04-4

CYB-DOC-04-5

CYB-DOC-04-6

CYB-DOC-04-7

CYB-DOC-05-1

CYB-DOC-05-2

CYB-DOC-05-3

CYB-DOC-05-4

AREA DOC REF DOCUMENT
1. Firewalls 2. Secure Configuration 3. Security update management
CYB-DOC-03-1 Patch Management Policy
CYB-DOC-03-2 Software Inventory None EXAMPLE Software Inventory
4. User access control
Access
Control Policy
Internet
Acceptable Use Policy
User Access Management Process
Cryptographic
Policy
Physical
Security Policy
System
Owners
Admin
Cyber
User Accounts None
Essentials Poster - Passwords None EXAMPLE Admin User Accounts
None EXAMPLE System Owners
5. Malware Protection
Anti-Malware
Policy
Electronic
Messaging Policy
Incident
Response Plan Ransomware
Threat
Cyber
Intelligence Policy None
Essentials Poster - Phishing
23/03/2023 Page 1 of 1
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.