IT Risk

The following 158 items are listed by Content Data.
Checklists & Questionnaires

IT Disaster Recovery Plan Assessment Checklist

The questions included in this document can be used to evaluate an organization’s IT disaster recovery plan.
Mon, Dec 5, 2022
Audit Programs

Security Audit Work Program

Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Mon, Nov 28, 2022
Policies & Procedures

Third-Party Access Policy

This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Mon, Oct 3, 2022
Audit Programs

Firewall Audit Work Program

This tool contains four sample work programs that provide general steps organizations can use for conducting a firewall ...
Mon, Sep 19, 2022
Methodologies & Models

IT General Controls Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Mon, Sep 12, 2022
Methodologies & Models

IT Support Service Desk Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s IT support service desk manageme...
Subscriber Content
Mon, Sep 5, 2022
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 15, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Mon, Aug 8, 2022
Policies & Procedures

Firewall Administration Policy

This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Mon, Jul 4, 2022
Policies & Procedures

Security Incident Policy

This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Mon, Jun 27, 2022
Policies & Procedures

Password Security Policy

This tool contains four sample policies that establish a company’s guidelines regarding secure and consistent system pas...
Subscriber Content
Mon, May 23, 2022
Policies & Procedures

IT Contingency Planning Policy

The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content
Mon, May 16, 2022