The following 171 items are listed by Content Data.
Blog
What Is IT Risk and How Should You Manage It?
What Is IT Risk?Information technology (IT) risk is any potential threat to business data, critical systems...
Methodologies & Models
IT General Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Audit Programs
Intellectual Property Network Audit Work Program
In this work program sample, we outline general best-practice steps for the intellectual property network audit process.
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Requests for Proposals - RFPs
Request for Proposal: IT Audit
This sample request for proposal (RFP) can be used by organizations seeking a qualified service provider to implement an...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Audit Programs
Configuration Controls Audit Work Program
In this work program sample, we provide general best-practice steps for the configuration controls audit process.
Subscriber Content
Checklists & Questionnaires
IT Change Management Process Questionnaire
Use the questions included in this tool to ensure that all changes to IT resources and infrastructure configurations are...
Subscriber Content
Methodologies & Models
Change Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s change management process and to...
Subscriber Content
Methodologies & Models
Access Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s access controls process and to a...
Subscriber Content
Policies & Procedures
IT Equipment and Information Control Policy
This policy sample establishes guidelines and procedures common to effective company equipment and system information pr...
Subscriber Content
Policies & Procedures
Systems Audit Logging and Monitoring Policy
This sample policy is designed to help organizations define and comply with system audit logging and monitoring requirem...
Subscriber Content