The following 39 items are listed by Content Data.
Checklists & Questionnaires
Identity Management Tool Questionnaire
The questions provided in this tool can help organizations manage their security and privacy concerns specific to identi...
Subscriber Content
Audit Programs
Social Engineering Audit Work Program
This sample work program provides general steps organizations should follow when performing a social engineering audit.
Subscriber Content
Audit Programs
VoIP Audit Work Program
This sample audit program provides general steps organizations can use to perform an audit of an organization's voice ov...
Subscriber Content
Policies & Procedures
Facility Access Controls Policy
This sample policy provides an overview of procedures organizations should perform during the facility access controls p...
Subscriber Content
Protiviti Booklets
FAQ: Understanding the General Data Protection Regulation
Organizations have many questions about the General Data Protection Regulation (GDPR), and in response, Protiviti has de...
Subscriber Content
Audit Reports
ISO 27001 Information Security Assessment Report
This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Articles
Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics
Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Audit Reports
Application Access Audit Report
This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Memos
Delegated Entity Review Memo
This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Memos
Minimum Testing Standards for Systems and Data Memo
This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content