-
Notifications
You must be signed in to change notification settings - Fork 0
/
mkdocs.yml
80 lines (74 loc) · 2.96 KB
/
mkdocs.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
site_name: 'Above Property Security Policies, Standards, and Procedures'
site_description: 'Above Property Security Policies, Standards, and Procedures'
site_url: 'https://compliance.aboveproperty.com/'
site_author: 'Above Property Systems, LLC.'
theme:
name: material
theme_dir: 'custom_theme'
include_sidebar: false
palette:
primary: 'indigo'
accent: ''
favicon: 'assets/images/favicon.ico'
logo: 'assets/images/aps_logo.png'
# Enable custom.css
extra_css:
- 'assets/css/custom.css'
# Turn off "Made with Material for MkDocs"
extra:
generator: false
plugins:
- search
- with-pdf:
cover_subtitle: Security Policies, Standards, and Procedures
output_path: pdf/Above_Property_Information_Security_Policy.pdf
markdown_extensions:
- smarty
- toc:
permalink: true
- sane_lists
- admonition
- codehilite:
guess_lang: false
nav:
- 'Home': 'index.md'
- 'Security Program Overview': 'program.md'
- 'Corporate Governance': 'corp-gov.md'
- 'Policy Management': 'policy-mgmt.md'
- 'Security Architecture and Operating Model': 'model.md'
- 'Roles, Responsibilities and Training': 'rar.md'
- 'Risk Management and Risk Assessment Process': 'risk-mgmt.md'
- 'Compliance Audits and External Communications': 'compliance-audit.md'
- 'System Audits, Monitoring and Assessments': 'system-audit.md'
- 'HR and Personnel Security': 'hr.md'
- 'Access': 'access.md'
- 'Facility Access and Physical Security': 'facility.md'
- 'Asset Inventory Management': 'asset-mgmt.md'
- 'Data Management': 'data-mgmt.md'
- 'Data Protection': 'data-protection.md'
- 'Secure Software Development and Product Security': 'sdlc.md'
- 'Configuration and Change Management': 'ccm.md'
- 'Threat Detection and Prevention': 'threat.md'
- 'Vulnerability Management': 'vuln-mgmt.md'
- 'Mobile Device Security and Media Management': 'mdm.md'
- 'Business Continuity and Disaster Recovery': 'bcdr.md'
- 'Incident Response': 'ir.md'
- 'Breach Investigation and Notification': 'breach.md'
- 'Third Party Security and Vendor Risk Management': 'vendor.md'
- 'Privacy Practice and Consent': 'privacy.md'
- 'Use of Generative AI': 'artificial-intelligence.md'
#- 'Addendum and References': 'ref.md'
- 'Appendix A. Employee Handbook': 'employee-handbook.md'
- 'Appendix B. Approved Software': 'approved-software.md'
- 'Appendix C. Approved Vendors': 'approved-vendors.md'
- 'Appendix D. Key Definitions': 'definitions.md'
- 'Appendix E. Privacy Policy': 'privacy-policy.md'
- 'Appendix F. Cookie Policy': 'cookie-policy.md'
- 'Appendix G. GDPR Data Processing Agreement': 'gdpr-dpa.md'
- 'Appendix H. NIST Controls mapping': 'nist-mapping.md'
- 'Appendix I. PCI DSS Controls Mapping': 'pci-dss-3-mapping.md'
- 'Appendix J. PCI DSS Program Charter': 'pci-charter.md'
- 'Appendix K. Current PCI DSS AOC': 'pci-certification.md'
- 'Appendix L. PCI DSS 4 system documentation': 'pci-dss4-notes.md'
- 'Appendix M. Responsible Disclosure Guidelines': 'responsible-disclosure.md'
- 'Appendix N. Complete PDF of this site': 'pdf.md'