The following 169 items are listed by Content Data.
Policies & Procedures
IT Automated Controls Policy
Define your company’s internal control testing processes and the testing frequency of its automated controls.
Subscriber Content
Audit Programs
PCI Review Audit Work Program
This audit program can be used by organizations to process PINs, create cryptographic keys and administer secure keys.
Subscriber Content
Guides
Sarbanes-Oxley Auditor Walk-Through Guide
This sample document can be used as a guide to help prepare company personnel for the walkthrough process related to Sar...
Subscriber Content
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Blog
New Content on KnowledgeLeader - 1/29/2024
ToolsThe following tools were published on KnowledgeLeader this week:Data Management PolicyThis Data M...
Audit Programs
IT Governance Audit Work Program
Reduce the risks associated with your organization’s IT governance audit process with the best-practice steps in this au...
Subscriber Content
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...
Subscriber Content
Guides
Service-Level Agreement Guide
This sample document can be used by organizations as a guide to developing and understanding service-level agreements (S...
Subscriber Content
Guides
Process Documentation Narrative and Flow Chart Guide
Document the understanding of a process, related controls, and key roles and responsibilities with process narratives an...
Subscriber Content
Policies & Procedures
Acceptable Use Policy
This tool contains two sample policies that establish standards and procedures organizations should follow for governing...
Subscriber Content
Policies & Procedures
Help Desk Infrastructure Policy
This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Subscriber Content
Guides
Internal Audit’s Role in Cybersecurity Guide
This document can be used as a guide for understanding internal audit’s role in an organization’s cybersecurity process....
Subscriber Content