IT Audit

The following 321 items are listed by Content Data.
Benchmarking Tools

External Access Risk Key Performance Indicators (KPIs)

This tool outlines the business risks associated with inappropriate access to systems, data or information and suggests ...
Subscriber Content
Mon, May 22, 2017
Newsletters

Board Oversight of Cyber Risk

Boards of directors need to ensure that the organizations they serve are improving their cybersecurity capabilities cont...
Subscriber Content
Mon, May 1, 2017
Newsletters

Improving Your Company’s Risk Assessment Process

This issue of Board Perspectives summarizes 10 practices that will help management and directors maximize the value deri...
Subscriber Content
Mon, Apr 24, 2017
Checklists & Questionnaires

IT Process Questionnaire: Computer Operations Management

This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Mon, Apr 17, 2017
Policies & Procedures

User Information Security Policy

This sample policy provides guidelines for securing user information.
Subscriber Content
Mon, Feb 20, 2017
Audit Programs

Virtual Private Network (VPN) Administration Audit Work Program

This audit work program includes test steps in the areas of documentation, logging, monitoring and user pool for VPN adm...
Subscriber Content
Mon, Nov 7, 2016
Policies & Procedures

Server Configuration Policy

This policy defines the standard security settings utilized on a company's servers.
Subscriber Content
Mon, Oct 17, 2016
Memos

Minimum Testing Standards for Systems and Data Memo

This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content
Mon, Oct 3, 2016
Memos

Sarbanes-Oxley Walkthrough Preparation Memo

This Sarbanes-Oxley process memo informs and prepares business process control managers to engage in “walkthrough” discu...
Subscriber Content
Mon, Oct 3, 2016
Memos

Enterprise Accounting System Post-Implementation Review Memo

This review focuses on the configurable application controls, application security, and segregation of duties for the ac...
Subscriber Content
Mon, Sep 12, 2016
Risk & Control Matrices - RCMs

Manage IT Assets RCM

This document outlines risks and controls common to the "manage IT assets" process in an RCM format.
Subscriber Content
Mon, Aug 29, 2016
Memos

Network Audit Management Memo

This memo documents low-risk opportunities in the network infrastructure environment identified during an internal audit...
Subscriber Content
Mon, Aug 22, 2016