The following 38 items are listed by Content Data.
Audit Reports
ISO 27001 Information Security Assessment Report
This audit report focuses on a project baselining an organization’s information security practices, with the purpose of ...
Subscriber Content
Audit Programs
Vendor Review Audit Work Program
This sample provides steps for reviewing a company’s vendor management process.
Subscriber Content
Articles
Five Common Identity and Access Management Pitfalls
This paper discusses five common identity and access management (IAM) pitfalls organizations run into today: lack of an ...
Subscriber Content
Articles
Integration Prioritization Model for Identity Access Management
Protiviti recommends a simple identity access management (IAM) prioritization model based on risk, impact and friction. ...
Subscriber Content
Articles
Obtain Greater Clarity Into Identity and Access Management by Establishing and Tracking Metrics
Identity and access management (IAM) has become a critical area of focus in security discussions within all organization...
Subscriber Content
Audit Reports
Application Access Audit Report
This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Policies & Procedures
IT System Access and Re-Certification Policy
This sample establishes the standards and procedures for maintaining proper system access security at a company.
Subscriber Content
Policies & Procedures
Oracle eBusiness Suite Policy
This sample policy outlines procedures for controlling access to and use of the Oracle eBusiness suite and database.
Subscriber Content
Policies & Procedures
User Information Security Policy
This sample policy provides guidelines for securing user information.
Subscriber Content
Memos
Delegated Entity Review Memo
This memo focuses on IT SOX readiness procedures for an application, testing change management, computer operations and ...
Subscriber Content
Memos
Minimum Testing Standards for Systems and Data Memo
This memo outlines minimum IT controls around user access, change control, backup, privacy, licenses and document retent...
Subscriber Content
Audit Programs
Security Policy Review Audit Work Program
The purpose of this work program is to determine whether the right security policies exist and determine if existing pol...
Subscriber Content