The following 36 items are listed by Content Data.
Policies & Procedures
IT Personnel Security Policy
Define standards and procedures for maintaining a secure operational environment, safeguarding company assets and promot...
Subscriber Content
Policies & Procedures
User Information Security Policy
Maintain the security and integrity of your organization’s information systems with this sample user information securit...
Subscriber Content
Audit Reports
Identity Access Management Report
Improve your identity and access management processes with the governance and infrastructure enhancements in this audit ...
Subscriber Content
Audit Programs
Vendor Review Audit Work Program
Improve your company’s vendor management process with the best-practice steps in this audit program sample.
Subscriber Content
Policies & Procedures
IT System Access and Re-Certification Policy
Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Subscriber Content
Policies & Procedures
Production System Access Policy
Define approved procedures governing access to production systems and applications as well as the documentation of chang...
Subscriber Content
Policies & Procedures
Password Security Policy
Use the four sample policies included in this tool to establish your company’s guidelines regarding secure and consisten...
Subscriber Content
Policies & Procedures
Disclosure of Private Data Policy
This sample policy outlines procedures for the disclosure, protection and transfer of a company's private data.
Subscriber Content
Policies & Procedures
Data Center Operations and Problem Management Policy
The objective of this document is to provide policy and procedure guidance for conducting major activities in a company'...
Subscriber Content
Memos
Security Access Badges Memo
This sample memo serves as a report of an internal audit function’s high-level assessment of the security access badges ...
Subscriber Content
Policies & Procedures
Separation of Duties Policy
In this sample policy, we outline the standards for applying separation of duties to protect a company’s information ass...
Subscriber Content
Audit Programs
Time and Labor System Post-Implementation Audit Work Program
This work program sample can be used by organizations to measure the infrastructure for an implemented time and labor sy...
Subscriber Content