IT Security

The following 182 items are listed by Content Data.

Methodologies & Models

Security Management Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Mon, Aug 14, 2023
Policies & Procedures

Disclosure of Private Data Policy

This sample policy outlines procedures for the disclosure, protection and transfer of a company's private data.
Subscriber Content
Mon, Jun 12, 2023
Articles

ISO 27001: 2022 – Key Changes and Approaches to Transition

A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content
Mon, Apr 3, 2023
Policies & Procedures

Cellular Phone Policy

Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Subscriber Content
Mon, Feb 20, 2023
Guides

Data Migration Strategy Guide

This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Mon, Jan 9, 2023
Policies & Procedures

Background Checks and Confidentiality Policy: Contractors

This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Subscriber Content
Mon, Dec 19, 2022
Risk & Control Matrices - RCMs

Manage Data Center Operations: Database Management RCM

This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Mon, Dec 12, 2022
Process Flows

Time Reporting Process Flow

This sample process flow can be used as a general guide to understanding and reviewing the steps in an organization’s ti...
Subscriber Content
Mon, Oct 24, 2022
Blog

How IT Controls Enhance the Value of IT Assets

It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Thu, Oct 6, 2022
Policies & Procedures

Infrastructure Security Policy

Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Mon, Sep 26, 2022
Methodologies & Models

Security Governance Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security governance process and ...
Subscriber Content
Mon, Aug 29, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Mon, Aug 8, 2022