The following 325 items are listed by Content Data.
Audit Reports
Segregation of Duties Review Report
Use the project overview, remediation road map and rollout plans included in this audit report sample to enhance your se...
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT asset management process and ...
Subscriber Content
Audit Reports
IT Audit Update: Audit Committee Report
Utilize this audit report sample to evaluate your organization’s general computer control risks and report on the progre...
Methodologies & Models
IT Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT governance and to assist its ...
Subscriber Content
Policies & Procedures
Portable Computing Device Security Policy
This sample policy establishes safeguards for the use of portable media and computing devices, including their connectio...
Policies & Procedures
Production Equipment Security Policy
Govern the security of your organization’s production equipment used in an internet-facing environment with the best-pra...
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Policies & Procedures
Instant Messaging Policy
This policy outlines a set of procedures for the proper use of instant messaging by company employees.
Policies & Procedures
Infrastructure Policy: Laptops
This policy describes the security precautions that must be taken by all individuals who have a company-issued laptop or...
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...