IT Risk

The following 125 items are listed by Content Data.
Audit Programs

IT General Controls Audit Work Program

This tool contains four sample work programs that provide general steps an organization should consider when evaluating ...
Mon, Mar 6, 2023
Audit Programs

IT Vendor Management Audit Work Program

Organizations can use the two templates included in this tool to build an audit plan for third-party IT services.
Mon, Mar 6, 2023
Checklists & Questionnaires

System Development Life Cycle Questionnaire

This tool contains two sample documents that highlight questions to consider when creating and measuring an organization...
Mon, Feb 13, 2023
Guides

IT Controls and Governance Guide

This guide highlights challenges that may disrupt an organization’s IT governance and provides a road map for activating...
Mon, Feb 6, 2023
Methodologies & Models

IT Program and Project Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s IT program and project managemen...
Subscriber Content
Mon, Dec 19, 2022
Checklists & Questionnaires

IT Disaster Recovery Plan Assessment Checklist

The questions included in this document can be used to evaluate an organization’s IT disaster recovery plan.
Mon, Dec 5, 2022
Audit Programs

Security Audit Work Program

Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Mon, Nov 28, 2022
Policies & Procedures

Third-Party Access Policy

This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Mon, Oct 3, 2022
Methodologies & Models

IT General Controls Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Mon, Sep 12, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Mon, Aug 8, 2022
Policies & Procedures

Firewall Administration Policy

This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Mon, Jul 4, 2022
Policies & Procedures

Security Incident Policy

This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content
Mon, Jun 27, 2022