Identity and Access Management

The following 63 items are listed by Content Data.
Policies & Procedures

Data Center Operations & Problem Management Policy

The objective of this document is to provide policy and procedure guidance for conducting major activities in a company'...
Subscriber Content
Mon, Oct 8, 2012
Audit Programs

Physical Security Audit Work Program

This 45-page work program outlines physical security best practices for data centers and information processing/storage ...
Subscriber Content
Mon, Jun 1, 2015
Audit Programs

Security Policy Review Audit Work Program

The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content
Mon, Jun 1, 2015
Memos

Minimum Testing Standards for Systems and Data Memo

This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content
Mon, Oct 3, 2016
Memos

Delegated Entity Review Memo

This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Mon, Oct 10, 2016
Policies & Procedures

User Information Security Policy

This sample policy provides guidelines for securing user information.
Subscriber Content
Mon, Feb 20, 2017
Policies & Procedures

Disclosure of Private Data Policy

This sample policy outlines procedures for the disclosure, protection and transfer of a company's private data.
Subscriber Content
Mon, Mar 20, 2017
Benchmarking Tools

External Access Risk Key Performance Indicators (KPIs)

This tool outlines the business risks associated with inappropriate access to systems, data or information and suggests ...
Subscriber Content
Mon, May 22, 2017
Policies & Procedures

Oracle eBusiness Suite Policy

This sample policy outlines procedures for controlling access to and use of the Oracle eBusiness suite and database.
Subscriber Content
Mon, Jul 24, 2017
Policies & Procedures

IT System Access and Re-Certification Policy

This sample establishes the standards and procedures for maintaining proper system access security at a company.
Subscriber Content
Mon, Aug 7, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Articles

2018 Audit Committee Agenda: Assessing Committee Effectiveness and Obtaining Business Context

This article covers the first two of eight recommendations Protiviti has for the 2018 audit committee agenda: periodic a...
Subscriber Content
Mon, Mar 12, 2018