The following 176 items are listed by Content Data.
Audit Programs
Firewall Audit Work Program
With this tool, you get four sample work programs designed to provide guidance for your next firewall audit.
Audit Programs
Spreadsheet Audit Work Program
Use the general best-practice steps included in this document to perform an effective spreadsheet audit.
Policies & Procedures
Computing Operations and Support: Service-Levels Policy
The purpose of this policy is to ensure that there are defined and documented IT services, service times and user-agreed...
Audit Programs
PCI Review Audit Work Program
This audit program can be used by organizations to process PINs, create cryptographic keys and administer secure keys.
Policies & Procedures
Cellular Phone Policy
Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Policies & Procedures
Change of Access Status Policy
This sample policy defines the conditions for creating, terminating or altering the status of a user’s access to company...
Guides
IT Controls and Governance Guide
This guide highlights challenges that may disrupt an organization’s IT governance and provides a road map for activating...
Guides
Internal Controls and Shareholder Value Guide
This sample provides an overview of internal controls and how they help with creating shareholder or stakeholder value.
Policies & Procedures
Approved Software Policy
This sample policy outlines procedures for the usage and maintenance of approved software in a company.
Checklists & Questionnaires
Data Governance Questionnaire
The questions included in this tool can be used by organizations to create an effective data governance framework.
Methodologies & Models
IT General Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Checklists & Questionnaires
System Implementation Process Questionnaire
The questions included in this tool can be applied to the implementation of new systems or major upgrades.
Subscriber Content