Incomplete Playbooks
These are playbooks for operationalizing policies that still need some polish before they can be publicly consumed.
Playbooks
Acceptable Use
Acceptable use of end-user computing devices and technology
Backup
Protection of the confidentiality, integrity, and availability of Narrative-Owned Data
Business Continuity
Recover following a disruption in conjunction with the Disaster Recovery Plan
Code of Conduct
Standards of ethical business conduct
Data Classification
Information classification and handling guidelines
Data Protection
Support data protection
Data Retention
Manage the retention and deletion of customer Data
Disaster Recovery
Recover Narrative following a disruption resulting from a disaster
Encryption
Protect the confidentiality, integrity, authenticity, and nonrepudiation of information
Incident Response
Ensure detection and reaction of security vulnerabilities, incidents and security breaches
Physical Security
Security of physical facilities
Risk Assessment
Methodology for the assessment and treatment of information security risks