The following 179 items are listed by Content Data.
Policies & Procedures
Cellular Phone Policy
Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Subscriber Content
Guides
Data Migration Strategy Guide
This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Policies & Procedures
Background Checks and Confidentiality Policy: Contractors
This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Database Management RCM
This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Process Flows
Time Reporting Process Flow
This sample process flow can be used as a general guide to understanding and reviewing the steps in an organization’s ti...
Subscriber Content
Blog
How IT Controls Enhance the Value of IT Assets
It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Methodologies & Models
Security Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security governance process and ...
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Policies & Procedures
Security Awareness Policy
This sample policy is designed to help organizations notify information system users about security policies, guidelines...
Subscriber Content
Audit Programs
Enterprise Risk Planning (ERP) Integration Architecture Audit Work Program
This work program template provides steps organizations can take to perform an enterprise risk planning (ERP) integratio...
Subscriber Content