1. User Registration and De-registration Policy
2. User Registration and De-registration Register
Privileged access rights and user access rights
3. Encryption Policy
Encryption to be implemented across the assets of the organization including personal devices. New employees are to be provided with company assets that will ensure consistency of security.
Encryption Policy to be developed that will outline Capen’s approach to use and the lifecycle of Encryption keys across all assets of the business.
4. Information Backup Policy
Outlining the procedures, frequency of backups, logging of backups
5. Event Logging Policy
Outlining the procedures, logging of events subject to the risk to the business and escalation to the Risk Management procedures being adopted by the business.
To fulfill your needs, I suggest you to look at the following documents: