Treasury Security Review Audit Work Program

Subscriber Content
Screenshot of the first page of Treasury Security Review Audit Work Program
Best Practices for Auditing Treasury Security Processes and Policies

In this work program sample, we provide general best-practice steps for the treasury security review audit process.

Sample steps include identifying users with access to edit configuration items and transactions; selecting a sample of users to identify and review for appropriateness to access; determining if system reports are run periodically; obtaining policies and procedures to grant user access; obtaining approval forms for initial requests; identifying the procedure to revoke access for terminated employees; and selecting a sample of 10 terminated employees and ensuring that their access is revoked.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.