The following 204 items are listed by Content Data.
Memos
Enterprise Accounting System Post-Implementation Review Memo
This review focuses on the configurable application controls, application security, and segregation of duties for the ac...
Subscriber Content
Memos
Network Audit Management Memo
This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Risk & Control Matrices - RCMs
Application Control Review RCM
This document outlines risks and controls common to the application control review process in a risk and control matrix ...
Subscriber Content
Memos
Scope of Application Security Memo
This memo outlines the assumptions and decision used to scope the documentation efforts around application security.
Subscriber Content
Audit Programs
Siebel/Oracle Information Security Audit Work Program
This audit program outlines procedures to evaluate six system control objectives.
Subscriber Content
Risk & Control Matrices - RCMs
Define IT Strategy and Organization RCM
This document outlines risks and controls common to the “define IT strategy and organization” process in a risk control ...
Subscriber Content
Audit Programs
System Backup Review Audit Work Program
The purpose of this audit program is to review an organization’s system backup procedures.
Subscriber Content
Audit Programs
Software Licensure Compliance Audit Work Program
This sample compliance work program can be modified for scope considerations that will depend on the extent of the softw...
Subscriber Content
Audit Programs
Security Policy Review Audit Work Program
The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Audit Programs
IT Data Management Audit Work Program
This document outlines steps to audit an organization’s data management process and includes a self-assessment questionn...
Subscriber Content
Risk & Control Matrices - RCMs
Manage Security and Privacy RCM
This document outlines risks and controls common to the "manage security and privacy" process in a risk control matrix (...
Subscriber Content
Audit Programs
Desktop Management Audit Work Program
This document outlines steps to audit the process used to deploy software to desktop computers.
Subscriber Content