Listing of Penske Security policies, procedures and other documents

Listing of Penske Security policies, procedures and other documents

This page provides a listing of all Penske Australia & New Zealand security-related policies, procedures, and other documents.


Document
Purpose
How to report security incidents, risks and threats
Provides the process for handling a data breach
G.IT01.001 Event Logging Policy
The event logging policy for IT systems and applications
The policy relating to system owners
Policy for auditing of data transfers in and out of Penske
The policy for retaining digital data in Penske
Policy for the sanitisation (erasure or destruction) of IT equipment
The approved cryptographic algorithms and ciphers for use within Penske
Acceptable usage policy for users of the PROTECTED network
Policy for configuration and existence of IDS and IPS
The policy for Data Classification of documents and emails
Policy for use of computers and software in Penske
Policy for use of mobile devices (phones, tablets) in Penske
Managing risks for third party IT suppliers
Acceptable usage policy for all Penske staff using IT equipment and services
An information security statement that can be shared to external parties
Process for backing up data and replicating data for disaster recovery
The process for restoring data from backups
The process for patching computers and servers
The process for managing vulnerabilities on IT assets
How to classify documents and emails
How to audit the importing and exporting of data
IT's procedures for various activities
Details the process for managing a major IT incident



    • Related Articles

    • Overview of Penske's Information Security

      The attached document was created as an overview of Penske Australia & New Zealand's Information Security (InfoSec/Cyber Security) that can be provided to external parties as needed, such as during tenders and contract negotiations, or to provide a ...
    • I got my security clearance, now what?

      If you just received your security clearance, first of all congratulations on getting through a likely tedious and lengthy process. But now that you have your security clearance, what does this mean and what are your ongoing obligations? Your ...
    • Penske Cyber Security Strategy 2023-2025

      Please find attached Cyber Secuity Strategy document for Penske Australia & New Zealand for 2023-2025.
    • Security cameras (CCTV) used within Penske

      Penske Australia & New Zealand has selected Cisco Meraki cameras as the standard camera to use across all locations as needed. Cisco Meraki cameras are approved for use on the network and for remote viewing. The different models of cameras can be ...
    • Obtaining a Defence security clearance

      Requesting a Defence security clearance can be done using the New Ticket form with the "Request a Security Clearance" layout option on the form. However, it is important to note the following requirements for requesting a clearance. The applicant ...