IT Audit

The following 319 items are listed by Content Data.
Newsletters

Improving Your Company’s Risk Assessment Process

This issue of Board Perspectives summarizes 10 practices that will help management and directors maximize the value deri...
Subscriber Content
Mon, Apr 24, 2017
Checklists & Questionnaires

IT Process Questionnaire: Computer Operations Management

This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Mon, Apr 17, 2017
Policies & Procedures

User Information Security Policy

This sample policy provides guidelines for securing user information.
Subscriber Content
Mon, Feb 20, 2017
Audit Programs

Virtual Private Network (VPN) Administration Audit Work Program

This audit work program includes test steps in the areas of documentation, logging, monitoring and user pool for VPN adm...
Subscriber Content
Mon, Nov 7, 2016
Policies & Procedures

Server Configuration Policy

This policy defines the standard security settings utilized on a company's servers.
Subscriber Content
Mon, Oct 17, 2016
Memos

Minimum Testing Standards for Systems and Data Memo

This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content
Mon, Oct 3, 2016
Memos

Sarbanes-Oxley Walkthrough Preparation Memo

This Sarbanes-Oxley process memo informs and prepares business process control managers to engage in “walkthrough” discu...
Subscriber Content
Mon, Oct 3, 2016
Memos

Enterprise Accounting System Post-Implementation Review Memo

This review focuses on the configurable application controls, application security, and segregation of duties for the ac...
Subscriber Content
Mon, Sep 12, 2016
Risk & Control Matrices - RCMs

Manage IT Assets RCM

This document outlines risks and controls common to the "manage IT assets" process in an RCM format.
Subscriber Content
Mon, Aug 29, 2016
Memos

Network Audit Management Memo

This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Mon, Aug 22, 2016
Risk & Control Matrices - RCMs

Application Control Review RCM

This document outlines risks and controls common to the application control review process in a risk and control matrix ...
Subscriber Content
Mon, Aug 15, 2016
Memos

Scope of Application Security Memo

This memo outlines the assumptions and decision used to scope the documentation efforts around application security.
Subscriber Content
Mon, Aug 15, 2016