Cyber Policy Wizard Beta
Answer a few questions about your organization and generate tailored, NIST-aligned information security policies entirely in your browser with no data stored
Organization Information
Key Personnel & Roles
These names and titles will be inserted into policy ownership, authority, and responsibility sections.
Vendor and external contact details referenced in the Incident Response Policy. Leave blank if not applicable to your organization.
IT Environment & System Scope
Select the system types present in your organization. Click a tile to select it, then check the specific technologies that apply to you. You don't need every item listed — they're just examples of what falls under each category. Hover the ? on any tile for guidance on whether it applies to you.
Applicable Regulatory Frameworks
Select all regulatory requirements and frameworks applicable to your organization. Compliance-specific language, required controls, and notification obligations will be added as addenda to the appropriate policies.
Policy Configuration
Set organization-specific parameters that will be embedded into policy language throughout all generated documents.
Define reportable incident types, severity thresholds that trigger IRP activation, and who holds communication authority during major incidents.
Event types that constitute a reportable security incident:
Response Communication Authority:
Set minimum retention periods by record category for the Data Retention Policy. Regulatory minimums (based on Step 4 selections) are noted in the labels.
Select Policies to Generate
Choose the policies you need. All are based on NIST SP 800-53 control families. Hover the ? next to each policy name for a description of what it covers, who needs it, and which regulations require it.