IT Security

The following 204 items are listed by Content Data.
Memos

Enterprise Accounting System Post-Implementation Review Memo

This review focuses on the configurable application controls, application security, and segregation of duties for the ac...
Subscriber Content
Mon, Sep 12, 2016
Memos

Network Audit Management Memo

This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Mon, Aug 22, 2016
Risk & Control Matrices - RCMs

Application Control Review RCM

This document outlines risks and controls common to the application control review process in a risk and control matrix ...
Subscriber Content
Mon, Aug 15, 2016
Memos

Scope of Application Security Memo

This memo outlines the assumptions and decision used to scope the documentation efforts around application security.
Subscriber Content
Mon, Aug 15, 2016
Audit Programs

Siebel/Oracle Information Security Audit Work Program

This audit program outlines procedures to evaluate six system control objectives.
Subscriber Content
Mon, Jun 27, 2016
Risk & Control Matrices - RCMs

Define IT Strategy and Organization RCM

This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Mon, Feb 29, 2016
Audit Programs

System Backup Review Audit Work Program

The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Mon, Oct 26, 2015
Audit Programs

Software Licensure Compliance Audit Work Program

This sample compliance work program can be modified for scope considerations that will depend on the extent of the softw...
Subscriber Content
Mon, Jun 22, 2015
Audit Programs

Security Policy Review Audit Work Program

The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Mon, Jun 1, 2015
Audit Programs

IT Data Management Audit Work Program

This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content
Mon, May 25, 2015
Risk & Control Matrices - RCMs

Manage Security and Privacy RCM

This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Mon, May 18, 2015
Audit Programs

Desktop Management Audit Work Program

This document outlines steps to audit the process used to deploy software to desktop computers.
Subscriber Content
Mon, Apr 20, 2015