The following 125 items are listed by Content Data.
Audit Programs
IT General Controls Audit Work Program
This tool contains four sample work programs that provide general steps an organization should consider when evaluating ...
Audit Programs
IT Vendor Management Audit Work Program
Organizations can use the two templates included in this tool to build an audit plan for third-party IT services.
Checklists & Questionnaires
System Development Life Cycle Questionnaire
This tool contains two sample documents that highlight questions to consider when creating and measuring an organization...
Guides
IT Controls and Governance Guide
This guide highlights challenges that may disrupt an organization’s IT governance and provides a road map for activating...
Methodologies & Models
IT Program and Project Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT program and project managemen...
Subscriber Content
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
The questions included in this document can be used to evaluate an organization’s IT disaster recovery plan.
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Policies & Procedures
Third-Party Access Policy
This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Methodologies & Models
IT General Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Policies & Procedures
Security Incident Policy
This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content