Cybersecurity Policies & Procedures

Practices that enhance your organization’s security posture

Security Policies & Procedures Template Available

Download Our Comprehensive Security Policy Template Now!

Take control of your organization’s digital safety with our expertly crafted Security Policy Template. Tailored to address all aspects of modern cybersecurity, this template is your first step toward a robust and efficient security framework. Don’t leave your data protection to chance. Contact an EDCi Expert and walk through the template together. 

2023 Gov’s Summit – Giveaway – Xbox





Your Email Privacy Matters to Us
At EDCi, we value your trust and privacy.

That’s why we promise:
Zero Spam: Only essential, relevant emails.
You’re in Control: Easy email preferences and opt-out options.
Your Data, Your Rights: We never sell your email info.

Join us for a spam-free experience!

Enhancing Security Policies with Cisco’s Integrated Solutions

  1. Enforcement of Zero-Trust Policies: Cisco ISE, being a central policy decision point in a zero-trust architecture, ensures that security policies are not just guidelines but actively enforced. It authenticates users and endpoints, allowing only verified and compliant entities access to network resources. This aligns perfectly with zero-trust policies that mandate “never trust, always verify.”

  2. Improved Risk Management and Threat Intelligence: The advanced threat analysis capabilities of these products enable organizations to identify and categorize threats, providing insights into vulnerable areas. This intelligence is crucial for updating and refining security policies to address specific risks and vulnerabilities, thereby improving overall risk management strategies.

  3. Streamlining Incident Response Procedures: With features like quick access to message details and the ability to remediate threats directly within the Threat Response interface, these products expedite the response to security incidents. This aligns with incident response procedures by reducing response times and making the process more efficient, thereby minimizing potential damage.

  4. Compliance with Security Standards: By verifying the compliance of devices with security policies (as done by ISE 3.x), organizations can ensure they meet various regulatory and internal standards. This is essential for maintaining compliance with security policies and procedures mandated by industry standards or legal requirements.

  5. Holistic Defense Against Varied Threats: The integration of industry-leading threat intelligence to defend against threats like phishing, malware, and ransomware means that security policies can be comprehensive and robust. These products enable organizations to craft procedures that are equipped to handle a wide range of cyber threats, thereby enhancing overall security posture.

  6. Rapid Remediation and Continuous Improvement: The rapid remediation capabilities of Cisco XDR facilitate quick action in the face of threats, an essential aspect of effective security procedures. Moreover, the continuous gathering of threat intelligence and system performance data allows for the ongoing refinement and improvement of security policies.

EDCi Security Policies & Procedures Services

Access Control

Unique User IDs: Each individual using our system is assigned a unique user identifier. This personalized approach ensures that your activities and preferences are accurately tracked and managed, enhancing your overall experience with our platform.

Robust Authentication Mechanisms: We prioritize your security. We require powerful authentication methods like two-factor or multi-factor authentication (MFA). These added layers of security protect your account from unauthorized access, giving you peace of mind while navigating our system.

Advanced Password Policies: We understand the importance of password security. To safeguard your account, we enforce policies that mandate complex passwords. Regular password changes are required, and we prevent the reuse of old passwords. This secures your account and keeps it aligned with the best cybersecurity practices.

Streamlined Account Creation: Setting up your user account is a breeze. Our account creation process is straightforward and aligns with our user identification policy. This ensures your account is set up correctly, saving you time and effort in the long run.

Ongoing Account Maintenance: We keep your user account up-to-date. Regular maintenance reflects changes in your role or employment status, ensuring that your access and permissions within our system align with your current needs.

Email Security Policies

Sender Policy Framework (SPF):
We’ve implemented SPF to validate outgoing emails. This reduces the risk of email spoofing, ensuring that the emails you receive from us are authentic and trustworthy.

DomainKeys Identified Mail (DKIM):
DKIM is used to authenticate the domain name associated with an email message. When you receive an email from our domain, you can be confident that it’s genuinely from us and not an impersonator.

Domain-based Message Authentication, Reporting, and Conformance (DMARC):
Our use of DMARC provides instructions to receiving mail servers on handling unauthenticated emails. This policy helps prevent email fraud, protecting your inbox from potential threats.

Email Encryption Policy:
We mandate the use of encryption for sensitive emails. This includes transit encryption, Transport Layer Security (TLS), and encryption at rest. This ensures your sensitive information remains confidential and secure during and after its online journey.

Anti-Phishing Measures:
To combat phishing attempts, we have implemented sophisticated email filtering solutions. These measures detect and block phishing emails, significantly reducing the risk of encountering malicious content.

Content Filtering:
Content filtering is in place to prevent the unauthorized sharing of confidential data. This protects sensitive information from being inadvertently or maliciously transmitted outside the organization.

Mobile Device and BYOD

Device Registration and Compliance Policy:

  1. Registration Requirements: For your security and convenience, we require all personal devices used for work purposes to be registered. This helps us keep track of the devices accessing our corporate resources, ensuring a secure and organized digital environment for your work.

  2. Compliance Standards: We have set clear security standards that your devices must meet to access corporate resources. This step is essential to maintain a high level of security and to ensure that your device is well-equipped to handle corporate data safely.

Device Security Policy:

  1. Encryption: To protect the data on your mobile devices, we require encryption for all stored data. This measure is crucial for safeguarding sensitive information, even in the event of unauthorized access to your device.

  2. Lock Screen and Authentication: We mandate the use of strong lock screen passwords, PINs, or biometric authentication for your devices. This added layer of security helps prevent unauthorized access and keeps your work data secure.

Lost or Stolen Device Policy:

  1. Immediate Reporting: In case your device is lost or stolen, we have established a straightforward protocol for immediate reporting. This prompt action is vital for protecting any sensitive corporate data that might be on your device.

  2. Remote Wiping: Our policy includes provisions for remotely wiping corporate data from lost or stolen devices. This ensures that our corporate data remains secure, no matter what happens to the physical device.

BYOD Exit Policy:

  1. Data Removal: When you leave the company or change roles, we have defined procedures for removing corporate data from your personal devices. This process is crucial for maintaining data security and for ensuring that your personal information remains private.

Data handling

Data Classification Policy:

  1. Classification Levels: We categorize data into different levels of sensitivity: public, internal, confidential, and secret. This structured approach helps in understanding how to handle various types of information, ensuring that your data is managed with the appropriate level of security.

  2. Labeling and Handling Guidelines: Each category of data comes with clear labeling and handling guidelines. This means that whether you’re dealing with public information or highly confidential data, you’ll always know how it should be treated, keeping your interactions both safe and efficient.

Data Encryption Policy:

  1. Encryption Standards: Your data’s security is paramount. We use advanced encryption standards for data at rest and in transit, protecting it from unauthorized access or breaches.

  2. Key Management: The integrity of our encryption is upheld through meticulous key management. We have strict procedures for key generation, distribution, storage, and destruction, ensuring that your data remains secure throughout its lifecycle.

Secure Data Transfer:

  1. Transfer Protocols: We employ secure file transfer protocols, such as SFTP and HTTPS, for all data transfers. This ensures that your data remains protected during transit, whether it’s moving within our system or to external entities.

  2. Third-Party Agreements: When working with third parties, we include strict clauses on data security and privacy in our agreements. This ensures that your data is handled with the same level of care and security, no matter where it’s being processed.