As organizations increasingly face cyber threats and security breaches, adhering to robust cybersecurity practices has become essential. Our CAN CIOSC 104:2021 (CyberSecure Canada) templates are meticulously designed to align with the CAN CIOSC 104:2021 requirements, providing a practical and efficient solution for organizations striving to meet these standards.
Our CyberSecure Canada templates offer a collection of policy templates, each tailored to address specific sub-controls outlined by the CyberSecure Canada program. These templates are comprehensive and cover various critical areas, including antimalware, firewalls, incident response plans, and more. By utilizing our templates, organizations can establish a strong foundation for their cybersecurity policies, ensuring alignment with the CyberSecure Canada framework.
Key Features and Benefits
Alignment with CyberSecure Canada Requirements
Our templates have been developed to meet the specific guidelines and requirements set forth by the CAN CIOSC 104:2021 standard. This ensures that organizations can create policies that align with industry best practices and regulatory standards.
Policy Templates for Each Sub-Control
Our templates include policy documents for each sub-control identified by CAN CIOSC 104:2021. This approach enables organizations to create policies that address all necessary areas, fostering a holistic cybersecurity approach.
The CAN CIOSC 104:2021 templates cover a wide range of cybersecurity domains, including but not limited to antimalware measures, firewalls, incident response plans, employee awareness training, access control, data backup and recovery, etc.
Personalized and Scalable
Our templates are personalized with your business name and logo, and allow organizations to tailor the policies to their specific needs and organizational structure. Furthermore, the templates are scalable, accommodating businesses of various sizes and industry sectors.
By utilizing our CyberSecure Canada templates, organizations can save valuable time and effort in developing cybersecurity policies from scratch. The templates serve as a great starting point, enabling businesses to expedite the policy creation process.
Why use the templates?
Our templates provide organizations with a convenient and comprehensive solution for establishing robust cybersecurity policies aligned with the CyberSecure Canada program. By leveraging these templates, businesses can enhance their cybersecurity posture, mitigate risks, and demonstrate their commitment to safeguarding sensitive data and digital assets. Start your journey towards CAN CIOSC 104:2021 compliance today with our ready-to-use templates!
What policies are included?
OC 188.8.131.52 Leadership
OC 184.108.40.206 Accountability
OC 220.127.116.11 Cyber Security Training
OC 18.104.22.168 Ongoing awareness training
OC 22.214.171.124 Cyber Security Risk Assessment
OC 126.96.36.199 Cyber Security Risk Assessment Policy
OC 188.8.131.52 List of information systems and assets
OC 184.108.40.206 Accepted cyber security risks
OC 220.127.116.11 IT Security-Spending Levels-Raw
OC 18.104.22.168 IT security staffing
OC 22.214.171.124 Commitment to Cyber Security
OC 126.96.36.199 When to update an existing cyber security risk assessment
OC 188.8.131.52 Implementing baseline controls
OC 184.108.40.206 Reviewing controls to ensure effectiveness
BC 220.127.116.11 & 18.104.22.168 Incident Response Plan
BC 22.214.171.124 Cybersecurity insurance
BC 126.96.36.199 Security patches
BC 188.8.131.52 Automatic Patching
BC 184.108.40.206 Replacing systems incapable of automatic patching
BC 220.127.116.11 Enable security software
BC 18.104.22.168 Changing default passwords
BC 22.214.171.124 Secure configurations for devices
BC 126.96.36.199 Multi-factor authentication
BC 188.8.131.52 Changing password on suspicion of compromise
BC 184.108.40.206 Password length-reuse-writing down
BC 220.127.116.11 Password managers
BC 18.104.22.168 Essential business information
BC 22.214.171.124 Frequency of backups
BC 126.96.36.199 System backups
BC 188.8.131.52 Storing backups
BC 184.108.40.206 Encrypting backups
BC 220.127.116.11 Sampling backup data
BC 18.104.22.168 Firewalls
BC 22.214.171.124 DNS Firewall
BC 126.96.36.199 Software firewalls
BC 188.8.131.52 Encrypted Connectivity and VPN Access with MFA
BC 184.108.40.206 Corporate Wi-Fi
BC 220.127.116.11 Segmenting corporate and public networks
BC 18.104.22.168 DMARC
BC 22.214.171.124 Email filtering
BC 126.96.36.199 Provision accounts with minimum functionality necessary
BC 188.8.131.52 Removing accounts or functionality when no longer required
BC 184.108.40.206 Admin accounts only perform administrative activities
BC 220.127.116.11 Centralized authorization control system
BC 18.104.22.168 Ownership model for mobile devices
BC 22.214.171.124 Securing mobile devices
BC 126.96.36.199 Evaluating risk tolerance for outsourced IT or cloud apps
BC 188.8.131.52 AICPA SSAE 18 or equivalent reports
BC 184.108.40.206 OWASP Top 10
BC 220.127.116.11 ASVS Levels
BC 18.104.22.168 Company owned portable media
BC 22.214.171.124 Using portable media
BC 126.96.36.199 POS Terminals and Financial Systems
BC 188.8.131.52 Log management