IT Security

The following 182 items are listed by Content Data.

Risk & Control Matrices - RCMs

Manage Data Center Operations: Database Management RCM

This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Mon, Dec 12, 2022
Process Flows

Time Reporting Process Flow

This sample process flow can be used as a general guide to understanding and reviewing the steps in an organization’s ti...
Subscriber Content
Mon, Oct 24, 2022
Blog

How IT Controls Enhance the Value of IT Assets

It is impossible to overstate the value of information technology (IT) to the world of businesses and indus...
Thu, Oct 6, 2022
Policies & Procedures

Infrastructure Security Policy

Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Mon, Sep 26, 2022
Methodologies & Models

Security Governance Capability Maturity Model (CMM)

This capability maturity model can be used to measure the maturity of an organization’s security governance process and ...
Subscriber Content
Mon, Aug 29, 2022
Policies & Procedures

Data Center Security Policy

This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Mon, Aug 29, 2022
Audit Programs

Network Device Configuration Management Audit Work Program

This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Mon, Aug 8, 2022
Policies & Procedures

Firewall Administration Policy

This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Mon, Jul 4, 2022
Policies & Procedures

Security Awareness Policy

This sample policy is designed to help organizations notify information system users about security policies, guidelines...
Subscriber Content
Mon, Jun 20, 2022
Policies & Procedures

Physical and Environmental Security Policy

This sample policy is designed to help organizations prevent unauthorized access, damage and interference to business pr...
Subscriber Content
Mon, Jun 6, 2022
Audit Programs

Enterprise Risk Planning (ERP) Integration Architecture Audit Work Program

This work program template provides steps organizations can take to perform an enterprise risk planning (ERP) integratio...
Subscriber Content
Mon, Jun 6, 2022
Articles

Protiviti's Claire Gotham and Tyler Chase on Powering the City of the Future

As IoT grows exponentially, data platforms will become more important in ensuring that the energy needed to run a city i...
Subscriber Content
Mon, Jun 6, 2022