The following 319 items are listed by Content Data.
Audit Programs
PCI Review Audit Work Program
This audit program can be used by organizations to process PINs, create cryptographic keys and administer secure keys.
Guides
Sarbanes-Oxley Auditor Walk-Through Guide
This sample document can be used as a guide to help prepare company personnel for the walkthrough process related to Sar...
Audit Reports
Segregation of Duties Review Report
Use the project overview, remediation road map and rollout plans included in this audit report sample to enhance your se...
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT asset management process and ...
Subscriber Content
Audit Reports
IT Audit Update: Audit Committee Report
Utilize this audit report sample to evaluate your organization’s general computer control risks and report on the progre...
Methodologies & Models
IT Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT governance and to assist its ...
Subscriber Content
Policies & Procedures
Production Equipment Security Policy
Govern the security of your organization’s production equipment used in an internet-facing environment with the best-pra...
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Policies & Procedures
Instant Messaging Policy
This policy outlines a set of procedures for the proper use of instant messaging by company employees.
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...