Banner Image

All Services

Writing & Translation technical

Compliance Policy Standards

$50/hr Starting at $300

About the Service

A highly professional who has completed internal + external audits in different organizations. I consulted organizations for Information Security policies, procedures and standards using ISO 27001, ISO 27701, ISO27002, ISO 27018, ISO 20000, NIST, GDPR, SOC type 1&2, HIPAA compliance and many more.


What We offer

A brief list of documentation that I can do ISMS and many others as well (ISO 27001, GDPR, SOC2, SOX, HIPAA etc.


  • A.5 Information security policies
  • A.6Mobile devices and teleworking
  • A.7 Human resources security
  • A.8 Asset management
  • A.8 Information Classification
  • A.8 Media Handling
  • A.9 Access control
  • A.10 Cryptography
  • A.11 Physical and environmental security
  • A.12 Protection from malware
  • A.13 Communications security
  • A.13 Network security management
  • A.14 System acquisition, development, and maintenance
  • A.15 Supplier relationships
  • A.16 Incident management
  • A.17 Business continuity management Policy
  • A.18 Compliance
  • Risk Management Policy
  • Change Management Policy
  • Backup Policy
  • BYOD Policy
  • Password Management Policy
  • Internal Audit Procedure

About

$50/hr Ongoing

Download Resume

About the Service

A highly professional who has completed internal + external audits in different organizations. I consulted organizations for Information Security policies, procedures and standards using ISO 27001, ISO 27701, ISO27002, ISO 27018, ISO 20000, NIST, GDPR, SOC type 1&2, HIPAA compliance and many more.


What We offer

A brief list of documentation that I can do ISMS and many others as well (ISO 27001, GDPR, SOC2, SOX, HIPAA etc.


  • A.5 Information security policies
  • A.6Mobile devices and teleworking
  • A.7 Human resources security
  • A.8 Asset management
  • A.8 Information Classification
  • A.8 Media Handling
  • A.9 Access control
  • A.10 Cryptography
  • A.11 Physical and environmental security
  • A.12 Protection from malware
  • A.13 Communications security
  • A.13 Network security management
  • A.14 System acquisition, development, and maintenance
  • A.15 Supplier relationships
  • A.16 Incident management
  • A.17 Business continuity management Policy
  • A.18 Compliance
  • Risk Management Policy
  • Change Management Policy
  • Backup Policy
  • BYOD Policy
  • Password Management Policy
  • Internal Audit Procedure

Skills & Expertise

Compliance ConsultingDocument DesignGap AnalysisGDPRHIPAAISO 27001ISO 9000ManagementNetworkingPolicies & ProceduresPolicy AnalysisSecurity ConsultingSoxTechnical Writing

Related Work Collections

0 Reviews

This Freelancer has not received any feedback.