The following 210 items are listed by Content Data.
Audit Programs
Database Audit Work Program
This tool includes two sample audit programs that provide steps organizations can take to perform a database administrat...
Subscriber Content
Guides
IT Controls and Governance Guide
This guide highlights challenges that may disrupt an organization’s IT governance and provides a road map for activating...
Subscriber Content
Policies & Procedures
IT Personnel Security Policy
This tool contains two sample policies that define the security standards that must be applied regarding personnel.
Subscriber Content
Policies & Procedures
Building and Data Center Physical Security Policy
This policy sample can be used by organizations to ensure that company buildings and data centers remain secure.
Subscriber Content
Guides
Data Migration Strategy Guide
This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Policies & Procedures
Background Checks and Confidentiality Policy: Contractors
This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Subscriber Content
Risk & Control Matrices - RCMs
Manage Data Center Operations: Database Management RCM
This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Process Flows
Time Reporting Process Flow
This sample process flow can be used as a general guide to understanding and reviewing the steps in an organization’s ti...
Subscriber Content
Policies & Procedures
Third-Party Access Policy
This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Subscriber Content
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Policies & Procedures
Data Center Security Policy
This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Methodologies & Models
Security Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security governance process and ...
Subscriber Content