[Procedure Name]
[Procedure Name]
([PROCEDURE-ID])
1. Purpose
State the purpose of this procedure. This should explain what the procedure is intended to accomplish. For example: “The purpose of this procedure is to describe the process for requesting, establishing, and issuing access changes…”
2. Scope
Define who and what this procedure applies to. For example: “This procedure applies to all requests for access additions and changes for systems X, Y, and Z.”
3. Overview
Provide a brief, high-level summary of the procedure from start to finish. For example: “This procedure ensures timely action relating to requesting, establishing, and issuing access changes to Company business applications…”
4. Procedure
Provide the detailed, step-by-step instructions for carrying out the procedure. The table format is standard.
Step | Who | What |
---|---|---|
1 | [e.g., Requestor] | [Describe the action to be taken in this step.] |
2 | [e.g., Manager] | [Describe the action to be taken in this step.] |
3 | [e.g., System Administrator] | [Describe the action to be taken in this step.] |
5. Standards Compliance
This section maps the procedure steps to specific controls from relevant information security standards.
Procedure Step(s) | Standard/Framework | Control Reference |
---|---|---|
[e.g., 1-3] | [e.g., ISO/IEC 27001:2022] | [e.g., A.5.18] |
[e.g., 3] | [e.g., PCI-DSS v4.0] | [e.g., Req. 7.2.2] |
6. Artifact(s)
Describe the record or evidence that is created upon completion of the procedure. For example: “A completed and approved access request issue in the tracking system.”
7. Definitions
Define any specialized terms, acronyms, or phrases used in the procedure. If none, state “N/A”.
[Term 1]: [Definition of the term.]
[Term 2]: [Definition of the term.]
8. Responsibilities
Clearly assign responsibility for various aspects of the procedure.
Role | Responsibility |
---|---|
[Role Title] | [Describe the specific responsibilities for this role.] |
[Role Title] | [Describe the specific responsibilities for this role.] |