IT Audit

The following 325 items are listed by Content Data.
Methodologies & Models

Access Controls Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s access controls process and to a...
Subscriber Content
Mon, Dec 20, 2021
Policies & Procedures

IT Equipment and Information Control Policy

This policy sample establishes guidelines and procedures common to effective company equipment and system information pr...
Subscriber Content
Mon, Dec 20, 2021
Benchmarking Tools

Transaction Authority Risk Key Performance Indicators (KPIs)

This tool contains performance measures and questions an organization can use to enforce and ensure the validity of tran...
Subscriber Content
Mon, Dec 13, 2021
Risk & Control Matrices - RCMs

Manage Data Center Operations: Data Warehouse and Business Intelligence Management RCM

This document outlines risks and controls common to data warehouse and business intelligence management in a risk contro...
Subscriber Content
Mon, Dec 6, 2021
Audit Programs

Application Security Review and Testing Audit Work Program

This tool includes two sample audit programs that provide steps organizations can take to facilitate an application secu...
Subscriber Content
Mon, Nov 8, 2021
Audit Programs

Data Conversion Audit Work Program

This tool contains two sample audit programs that provide steps organizations can take to perform a data conversion audi...
Subscriber Content
Mon, Oct 25, 2021
Policies & Procedures

Telecommunication Usage Policy

This sample policy defines guidelines and procedures organizations should follow when using telecommunications systems.
Subscriber Content
Mon, Oct 25, 2021
Policies & Procedures

IT Risk Assessment Policy

The objective of this policy is to provide a standardized approach and operating instructions for the execution of a com...
Subscriber Content
Mon, Oct 18, 2021
Benchmarking Tools

IT Change Management Leading Practices

This tool features leading practices that can be used to evaluate and improve an organization’s IT infrastructure.
Subscriber Content
Mon, Oct 4, 2021
Policies & Procedures

Data Backup and Retention Policy

This tool contains three sample policies that highlight guidelines and procedures common to recognizing and retaining da...
Subscriber Content
Mon, Sep 20, 2021
Policies & Procedures

Information Security Management System Policy

This policy establishes the scope of a company's information security management system and characterizes the interfaces...
Subscriber Content
Mon, Sep 13, 2021
Benchmarking Tools

Enterprise Security Key Performance Indicators (KPIs)

The purpose of this tool is to encourage dialog and help an organization assess the state of its network security. Areas...
Subscriber Content
Mon, Sep 6, 2021