The following 327 items are listed by Content Data.
Policies & Procedures
IT System Development Lifecycle (SDLC) Methodology Policy
This policy defines the methodologies and processes for the effective implementation of application development projects...
Policies & Procedures
Intranet and Internet Security Policy
This tool contains two sample policies that outline guidelines for a company's internet and intranet security.
Policies & Procedures
IT Data Management Policy
Our IT Data Management Policy outlines guidelines to ensure that critical data stored in applications and on servers is ...
Policies & Procedures
IT Support Policy
Explore our detailed IT support policy for employees, covering request submission, urgent assistance after hours and iss...
Policies & Procedures
IT Automated Controls Policy
Define your company’s internal control testing processes and the testing frequency of its automated controls.
Audit Programs
PCI Review Audit Work Program
This audit program can be used by organizations to process PINs, create cryptographic keys and administer secure keys.
Guides
Sarbanes-Oxley Auditor Walk-Through Guide
This sample document can be used as a guide to help prepare company personnel for the walkthrough process related to Sar...
Audit Reports
Segregation of Duties Review Report
Use the project overview, remediation road map and rollout plans included in this audit report sample to enhance your se...
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT asset management process and ...
Subscriber Content
Audit Reports
IT Audit Update: Audit Committee Report
Utilize this audit report sample to evaluate your organization’s general computer control risks and report on the progre...
Methodologies & Models
IT Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT governance and to assist its ...
Subscriber Content
Policies & Procedures
Portable Computing Device Security Policy
This sample policy establishes safeguards for the use of portable media and computing devices, including their connectio...