The following 230 items are listed by Content Data.
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Methodologies & Models
IT Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT governance and to assist its ...
Subscriber Content
Policies & Procedures
Production Equipment Security Policy
Govern the security of your organization’s production equipment used in an internet-facing environment with the best-pra...
Subscriber Content
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Subscriber Content
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...
Subscriber Content
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Subscriber Content
Guides
Enterprise Risk Assessment Methodology for Internal Audit Plan Development Guide
This guide presents a detailed approach to enterprise risk assessment methodology for internal audit plan development.
Subscriber Content
Policies & Procedures
Help Desk Infrastructure Policy
This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Subscriber Content
Policies & Procedures
Security and Access Policy
This Security and Access Policy provides a company with a single reference for governance pertaining to matters of secur...
Subscriber Content
Guides
IT Asset Management Guide
This guide focuses on improvements organizations can make to effectively perform their IT asset management process.
Subscriber Content
Guides
Segregation of Duties and Logical Access Guide
This guide can be used by auditors looking to better understand segregation of duties (SOD) processes and best practices...
Subscriber Content
Policies & Procedures
Internet and Email Acceptable Use Policy
This sample policy helps company employees optimize their use of the internet, protect confidential information, preserv...
Subscriber Content