About Flat Iron Technologies, LLC
Our Valued Team
Why Flat Iron Technologies, LLC?
Global Leaders for Security Policy Documents
Global Information Security Compliance Packet (GISCP) - Premier Edition
Premier Edition Product Data Sheet
Global Information Security Compliance Packet (GISCP) - Standard Edition
Standard Edition Product Data Sheet
Why We are Different
Other Documents for Sale
Purchase Only The Templates You Need
The Federal Information Security Management Act of 2002 (FISMA)
The Health Insurance Portability and Accountability Act of 1996 (HIPAA)
Health Information Technology for Economic and Clinical Health Act (HITECH)
The Family Educational Rights and Privacy Act (FERPA)
Fair and Accurate Credit Transaction Act of 2003 (FACTA - FACT ACT)
Red Flags Rule
Title 21 CFR, Part 11
Texas Medical Records Privacy Act | Texas HB 300
UCTI 252.204-7012 | CDI/CUI
The Gramm–Leach–Bliley Act (GLBA)
Experian Independent Third Party Assessment (EI3PA)
Payment Card Industry Data Security Standards (PCI DSS)
ISO 27001 | IEC | Information Technology - Security Techniques - Information Security Management Systems - Requirements | BS 27001:2013
ISO 27002 | IEC | Code of Practice for Information Security Controls | BS 27002:2013
Federal Financial Examination Council (FFIEC)
Control Objectives for Information and Related Technologies (COBIT)
Committee of Sponsoring Organizations of the Treadway Commission (COSO)
AICPA SOC Framework ( SOC 1, 2, 3)
Trust Services Principles (TSP)
Cloud Security Alliance (CSA)
Cloud Industry Forum (CIF)
Open Web Application Security Project (OWASP)
The Federal Risk and Authorization Management Program (FedRAMP)
HITRUST CSF | Common Security Framework
CMS Minimum Security Requirements (CMSR)
NIST SP 800 Publications
NIST SP 800-53
NIST SP 800-30
NIST SP 800-37
NIST SP 800-125
ISACA Audit/Assurance Programs
US Critical Infrastructure Protection (CIP)
FERC & NERC
NERC Critical Infrastructure Protection (CIP)
Electricity Subsector Cybersecurity Capability Maturity Model | ES-C2M2
Defense Information System Agency Security Technical Implementation Guides | DISA STIGs
CSC | 20 Critical Security Controls for Cyber Defense
Secondary Nav bar
How were your Documents Developed?
What is ISO 27001?
What is ISO 27002?
What is ISO 27005?
What is ISO 27032?
What are the NIST SP 800 Series Publications?
What is NIST SP 800-53?
What is NIST SP 800-30?
What is NIST SP 800-37?
What is NIST SP 800-125?
What is FINRA?
What is COBIT?
What is COSO?
What is NACHA?
What is the Cloud Security Alliance (CSA)?
What is the Cloud Industry Forum (CIF)?
What is the Open Web Application Security Project (OWASP)?
What is the SANS Institute?
What is FedRAMP?
What is HITRUST CSF?
What are the CMS Minimum Security Requirements (CMSR)?
What is FIPS?
What are the Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs)?
What is the AICPA Service Organization Control (SOC) reporting framework?
What is SOC 1 SSAE 16 reporting?
What is SOC 2 Reporting?
What is SOC 3 Reporting?
What are the Trust Services Principles?
What is Title 21 CFR Part 11?
What is US-CERT?
What is the U.S. CIP?
What is FERC and NERC?
What is NERC CIP?
What is ES-C2M2
What is the CIS Security Benchmarks Division?
What is the Open Source Vulnerability Database?
What is the Common Configuration Enumeration (CCE)?
What is the Common Vulnerabilities and Exposures (CVE)?
What are the NSA Security Configuration Guides?
What is the Security Content Automated Protocol (SCAP)?
What is the Common Platform Enumeration (CPE)?
What is the Common Weakness Enumeration (CWE)?
What is Malware (MAEC)?
What is Cyber Observables (CyboX)?
What is Structured Threat Information Expression (STIX)?
What is Trusted Automated Exchange of Indicator Information (TAXII)?
What is Making Security Measurable (MSM)?
What is Open Vulnerability and Assessment Language (OVAL)?
What is Common Attack Pattern Enumeration and Classification (CAPEC)?
What is Software Assurance (SwA) concept?
What are the Consensus Audit Guidelines (CAG) | SANS | 20 Critical Security Controls?
What is Defense in Depth?
What is Layered Security?
What is the Concept of CIA?
What is AAA?
What is Cyber Security?
What is Cloud Computing?
What is Patch Management?
What is Vulnerability Management?
What is Configuration Management?
What is Change Management?
What is Data Loss Prevention (DLP)?
What is Role Based Access Control (RBAC)?
What is Software as a Service (SaaS)?
What is Virtualization?
What is Encryption?
What are Audit Trails & Audit Logs?
What is baseline security?
What is Boundary Protection?
What is Buffer Overflow?
What is Contingency Plan?
What is Business Impact Analysis (BIA)?
What is continuous Monitoring?
What is a DMZ?
What are Zero-Day Exploits, Attacks?
What is Personally Identifiable Information (PII)?
What is Protected Health Information (PHI)?
What is ePHI?
What is PIFI?
Protected Health Information (PHI) Overview and Best Practices
Overview of Change Management | Best Practices for Information Systems
Overview of Patch Management | Best Practices for Information Systems
Overview of Personally Identifiable Information (PII) | Best Practices for Information Security
Top 25 List of Information Security Policies and Procedures
Information Technology Policy and Procedure Templates