Identity and Access Management

The following 38 items are listed by Content Data.
Audit Reports

ISO 27001 Information Security Assessment Report

This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Mon, May 6, 2019
Audit Programs

Vendor Review Audit Work Program

This sample provides steps for reviewing a company’s vendor management process.
Subscriber Content
Mon, Nov 19, 2018
Articles

Five Common Identity and Access Management Pitfalls

This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Mon, Oct 29, 2018
Articles

Integration Prioritization Model for Identity Access Management

Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Mon, Oct 29, 2018
Articles

Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics

Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Mon, Jul 9, 2018
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Policies & Procedures

IT System Access and Re-Certification Policy

This sample establishes the standards and procedures for maintaining proper system access security at a company.
Subscriber Content
Mon, Aug 7, 2017
Policies & Procedures

Oracle eBusiness Suite Policy

This sample policy outlines procedures for controlling access to and use of the Oracle eBusiness suite and database.
Subscriber Content
Mon, Jul 24, 2017
Policies & Procedures

User Information Security Policy

This sample policy provides guidelines for securing user information.
Subscriber Content
Mon, Feb 20, 2017
Memos

Delegated Entity Review Memo

This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Mon, Oct 10, 2016
Memos

Minimum Testing Standards for Systems and Data Memo

This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content
Mon, Oct 3, 2016
Audit Programs

Security Policy Review Audit Work Program

The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Mon, Jun 1, 2015