PDF v2.4

Ransomware Incident Response Playbook

Step-by-step procedures for containment, eradication, and recovery during ransomware events. Includes communication templates and legal hold guidelines.

Updated Oct 2024 Download
Checklist v1.8

Cloud Security Configuration Baseline

Hardening checklist for AWS, Azure, and GCP environments. Covers IAM policies, network segmentation, logging, and encryption standards.

Updated Sep 2024 Download
Guide v3.1

Zero Trust Architecture Implementation

Comprehensive guide to migrating from perimeter-based security to a Zero Trust model. Includes identity verification, micro-segmentation, and continuous monitoring.

Updated Nov 2024 Download
PDF v2.0

SOC Analyst Triage & Escalation Procedures

Standard operating procedures for initial alert triage, severity classification, forensic data collection, and cross-team escalation workflows.

Updated Oct 2024 Download
Template v1.5

Executive Cyber Risk Briefing Framework

Board-ready template for communicating security posture, threat landscape, budget requirements, and risk acceptance decisions to non-technical stakeholders.

Updated Aug 2024 Download
Guide v2.2

Phishing Simulation & Training Framework

Complete methodology for designing, deploying, and measuring phishing simulations. Includes email templates, landing page configs, and remediation tracking.

Updated Sep 2024 Download
Checklist v1.9

SOC 2 Type II Audit Preparation

Pre-audit readiness checklist covering security, availability, processing integrity, confidentiality, and privacy trust services criteria.

Updated Oct 2024 Download
PDF v2.1

Data Breach Notification & Legal Compliance

Jurisdiction-aware guide for breach disclosure timelines, regulator communication, customer notification drafting, and post-incident remediation tracking.

Updated Nov 2024 Download