Here we describe the key products marketed by our organization
Overview of product 1
Brief architectural discussion of product 1
Specific security considerations for product 1. Refer to policies, procedures here.
List relevant narratives, probably including Organizational Narrative Security Narrative System Narrative
List relevant policies, probably including Application Security Policy Datacenter Policy Log Management Policy Password Policy Security Incident Response Policy Risk Assessment Policy
List relevant procedures, probably including access review, patching, alert monitoring, log review, pen testing