IT Audit

The following 321 items are listed by Content Data.
Newsletters

Social Business: What it Means to Your Risk Profile

This issue of Board Perspectives: Risk Oversight discusses 10 examples of social business risks every company should mon...
Subscriber Content
Mon, May 6, 2013
Protiviti Booklets

Guide to the Sarbanes-Oxley Act: IT Risks and Controls

In this booklet, we provide guidance to Section 404 compliance project teams on the consideration of information technol...
Subscriber Content
Mon, Dec 17, 2012
Policies & Procedures

Production System Access Policy

This sample outlines a set of policies and procedures governing access to production systems and applications, and the d...
Subscriber Content
Mon, Oct 29, 2012
Policies & Procedures

System, Database and Application Administrator Policy

The purpose of this policy is to define the roles, activities, and responsibilities of administrators with regard to acc...
Subscriber Content
Mon, Oct 29, 2012
Policies & Procedures

User Authentication and Authorization Policy

The following sample policy outlines a set of policies and procedures governing user authentication and authorization an...
Subscriber Content
Mon, Oct 29, 2012
Policies & Procedures

Systems Development Lifecycle (SDLC) and Change Management Policy

This sample outlines a set of policies and procedures designed to provide an orderly process in which changes to a compa...
Subscriber Content
Mon, Oct 22, 2012
Policies & Procedures

User Malicious Software Policy

The purpose of this security policy is to outline the user’s responsibilities in ensuring updates and maintenance of ant...
Subscriber Content
Mon, May 28, 2012
Audit Programs

System Intrusion Audit Work Program

The objective of this audit work program is to evaluate a business’s ability to detect unauthorized system access attemp...
Subscriber Content
Mon, Mar 5, 2012
Newsletters

Social Media: What It Means to Your Risk Profile

In this issue of Board Perspectives: Risk Oversight, we reveal 10 examples of business risks to consider associated with...
Subscriber Content
Mon, Feb 6, 2012
Newsletters

Ten Questions the Board Should Ask

This issue of Board Perspectives: Risk Oversight provides 10 key questions for boards to consider as they plan their 201...
Subscriber Content
Mon, Dec 5, 2011
Policies & Procedures

Remote Network Access Policy

This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...
Subscriber Content
Mon, Sep 19, 2011
Process Flows

User Access Security Process Flow

This sample process flow outlines the steps to manage user access changes to company IT systems.
Subscriber Content
Mon, Jun 20, 2011