On this page
Service Overview
Policies and supporting documentation are the primary governance structure for a cybersecurity program. Security policies protect people and information, define expected personnel behaviors, define the organization's position on security, minimize risk and track compliance with regulations and legislation. Information security policies also provide a framework for best practices to align the business, from the top down, on its information security direction and expectations.
DeepSeas has developed a mature and audit-tested documentation set.
Objectives
The objectives of this initiative are as follows:
- DeepSeas will provide documentation templates
- DeepSeas will provide expert level consulting and support to address questions
Methodology
The methodology consists of the following activities:
- GUIDED DOCUMENTATION DEVELOPMENT
- DeepSeas will provide documentation templates to the Client and advise on initial development.
- DeepSeas will review documentation edits and accept all documents that align with ISO standards. Documents that require additional edits will be addressed through scheduled working sessions.
- DeepSeas will conduct working sessions for the duration and frequency defined in the scope.
- STATUS MEETINGS
- DeepSeas will host regular status meetings to validate documentation tasks are on track and to address questions the Client may have regarding documentation development.
- DeepSeas will conduct status meetings for the duration and frequency defined in the scope.
Deliverables
DeepSeas will produce the following deliverables:
- ISO 27001 - Documentation Templates
Service Assumptions
PROJECT-SPECIFIC ASSUMPTIONS
- DeepSeas will deliver all documentation templates in a standardized format that is accepted for certification. The Client can change the document type, however, the Client must understand the documentation requirements for certification.

Back to Service Library