The following 368 items are listed by Content Data.
Guides
IT Controls and Governance Guide
This guide highlights challenges that may disrupt an organization’s IT governance and provides a road map for activating...
Policies & Procedures
IT Personnel Security Policy
This tool contains two sample policies that define the security standards that must be applied regarding personnel.
Audit Reports
Annual Internal Audit Plan Report
This tool includes three sample audit reports that outline the approach employed by internal audit to develop an audit p...
Guides
Internal Controls and Shareholder Value Guide
This sample provides an overview of internal controls and how they help with creating shareholder or stakeholder value.
Policies & Procedures
Background Checks and Confidentiality Policy: Contractors
This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Policies & Procedures
Approved Software Policy
This sample policy outlines procedures for the usage and maintenance of approved software in a company.
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
The questions included in this document can be used to evaluate an organization’s IT disaster recovery plan.
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Checklists & Questionnaires
Data Governance Questionnaire
The questions included in this tool can be used by organizations to create an effective data governance framework.
Policies & Procedures
Third-Party Access Policy
This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Audit Programs
Firewall Audit Work Program
This tool contains four sample work programs that provide general steps organizations can use for conducting a firewall ...
Methodologies & Models
IT General Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content