IT Security

The following 231 items are listed by Content Data.
Policies & Procedures

IT Personnel Security Policy

This tool contains two sample policies that define the security standards that must be applied regarding personnel.
Mon, Jan 30, 2023
Policies & Procedures

Building and Data Center Physical Security Policy

This policy sample can be used by organizations to ensure that company buildings and data centers remain secure. 
Tue, Jan 17, 2023
Guides

Data Migration Strategy Guide

This guide is designed to help auditors successfully execute a data migration from end to end.
Mon, Jan 9, 2023
Policies & Procedures

Background Checks and Confidentiality Policy: Contractors

This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Mon, Dec 19, 2022
Risk & Control Matrices - RCMs

Manage Data Center Operations: Database Management RCM

This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Mon, Dec 12, 2022
Audit Programs

Security Audit Work Program

Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Mon, Nov 28, 2022
Guides

Achieving a Robust Data Analytics Program Guide

This tool can be used as a guide for measuring and improving an organization’s data analytics program.
Mon, Nov 21, 2022
Process Flows

Time Reporting Process Flow

This sample process flow can be used as a general guide to understanding and reviewing the steps in an organization’s ti...
Mon, Oct 24, 2022
Policies & Procedures

Third-Party Access Policy

This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Mon, Oct 3, 2022
Methodologies & Models

Security Governance Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security governance process and ...
Subscriber Content
Mon, Aug 29, 2022
Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 15, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Mon, Aug 8, 2022