The following 169 items are listed by Content Data.
Policies & Procedures
Change of Access Status Policy
This sample policy defines the conditions for creating, terminating or altering the status of a user’s access to company...
Subscriber Content
Guides
IT Controls and Governance Guide
This guide highlights challenges that may disrupt an organization’s IT governance and provides a road map for activating...
Subscriber Content
Guides
Internal Controls and Shareholder Value Guide
This sample provides an overview of internal controls and how they help with creating shareholder or stakeholder value.
Subscriber Content
Policies & Procedures
Approved Software Policy
This sample policy outlines procedures for the usage and maintenance of approved software in a company.
Subscriber Content
Checklists & Questionnaires
Data Governance Questionnaire
The questions included in this tool can be used by organizations to create an effective data governance framework.
Subscriber Content
Blog
What Is IT Risk and How Should You Manage It?
What Is IT Risk?Information technology (IT) risk is any potential threat to business data, critical systems...
Methodologies & Models
IT General Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Audit Programs
Intellectual Property Network Audit Work Program
In this work program sample, we outline general best-practice steps for the intellectual property network audit process.
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Requests for Proposals - RFPs
Request for Proposal: IT Audit
This sample request for proposal (RFP) can be used by organizations seeking a qualified service provider to implement an...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Audit Programs
Configuration Controls Audit Work Program
In this work program sample, we provide general best-practice steps for the configuration controls audit process.
Subscriber Content