Information Technology Policies, Standards and Procedures
Information Technology (IT) Policies, Standards, and Procedures are based on ADOA-ASET strategies and framework. This provides a comprehensive framework of business principles, best practices, technical standards, migration, and implementation strategies that direct the design, deployment, and management of IT for the State of Arizona.
Due to changes in P1050, template links for non-security policies have been removed. Please view the presentation for details.
For more information, please reach out to the ADOA-ASET PSP contact at [email protected].
P1000: IT Governance
P1050 - IT Policies, Standards & Procedures Program | ||
T1050 - Policy Template | ||
T1060 - Standard Template |
S1110 - Google Workspace Platform Standard |
P1250 - Website and Application Design Policy |
P1300 - Accessibility of Electronic or Information Technology Policy |
P1310 - Domain Naming Policy | ||
S1310 - Domain Naming Standard |
P1360 - Information Technology Planning Policy |
P1650 - Release Management Policy |
P4400: Data Governance
P4400 - Data Governance Organization Policy | ||
S4400 - Data Governance Organization Policy Exception Standard |
P4430 - Data Governance Technology Policy |
P4440 - Data Governance Data Interoperability Policy | ||
T4440 - AZ Standard Data Sharing Agreement Template | ||
Enterprise Data Sharing Memorandum of Understanding (Amended) |
P4450 - Data Governance Data Operations Policy |
P4460 - Data Governance Data Quality Policy |
P4465 - State-Owned Cloud Data Policy |
P4470 - Data Governance Documentation Policy |
Data Governance policy adoption cost worksheet | ||
Data Governance Policy Implementation Guidelines |
P5000: Collaboration and Communication
P5050 - Social Media Policy |
P5070 - Electronic and Digital Signature Policy |
P6000: State Data Center
P6000 - State Data Center Contingency Planning Policy |
P6100 - State Data Center Infrastructure Configuration Management and Change Control Policy |
P6200 - State Data Center Physical Security Policy |
P7000: Enterprise Architecture
P7100 - Network Architecture Policy | ||
S7100 - Network Infrastructure Standard |
P7300 - Software Architecture Policy |
P8000: Information Security
Risk Acceptance Form | ||
Risk Acceptance Questionnaire |
P8000 Information Security Policies (Combined) |
P8110 - Data Classification Policy | ||
T8110 - Data Classification Policy Template | ||
S8110 - Data Classification Summary |
P8130 - System Security Acquisition and Development Policy | ||
T8130 - System Security Acquisition and Development Policy Template | ||
S8130 - System Security Acquisition and Development Summary |
P8230 - Contingency Planning Policy | ||
T8230 - Contingency Planning Policy Template | ||
S8230 - Contingency Planning Summary |
P8250 - Media Protection Policy | ||
T8250 - Media Protection Policy Template | ||
S8250 - Media Protection Standard | ||
S8250 - Media Protection Summary |
P8260 - Physical Security Protections Policy | ||
T8260 - Physical Security Protections Policy Template | ||
S8260 - Physical Security Protections Summary |
P8270 - Personnel Security Controls Policy | ||
T8270 - Personnel Security Controls Policy Template | ||
S8270 - Personnel Security Controls Summary |
P8310 - Account Management Policy | ||
T8310 - Account Management Policy Template | ||
S8310 - Account Management Summary |
P8320 - Access Controls Policy | ||
T8320 - Access Controls Policy Template | ||
S8320 - Access Control Standard | ||
S8320 - Access Control Summary |
P8330 - System Security Audit Policy | ||
T8330 - System Security Audit Policy Template | ||
S8330 - System Security Audit Standard | ||
S8330 - System Security Audit Summary |
P8410 - System Privacy Policy | ||
T8410 - System Privacy Policy Template | ||
S8410 - System Privacy Summary |
Executive Order 2008-10 Mitigating Cyber Security Threats |
Guest Wireless Network Terms of Use |