The following 248 items are listed by Content Data.
Policies & Procedures
IT Data Management Policy
Our IT Data Management Policy outlines guidelines to ensure that critical data stored in applications and on servers is ...
Subscriber Content
Policies & Procedures
IT Support Policy
Explore our detailed IT support policy for employees, covering request submission, urgent assistance after hours and iss...
Subscriber Content
Policies & Procedures
IT Automated Controls Policy
Define your company’s internal control testing processes and the testing frequency of its automated controls.
Subscriber Content
Blog
New Content on KnowledgeLeader - 3/18/2024
ToolsThe following tools were published on KnowledgeLeader this week:Assessing the Effectiveness of a ...
Audit Programs
PCI Review Audit Work Program
This audit program can be used by organizations to process PINs, create cryptographic keys and administer secure keys.
Subscriber Content
Guides
Sarbanes-Oxley Auditor Walk-Through Guide
This sample document can be used as a guide to help prepare company personnel for the walkthrough process related to Sar...
Subscriber Content
Audit Reports
Segregation of Duties Review Report
Use the project overview, remediation road map and rollout plans included in this audit report sample to enhance your se...
Subscriber Content
Methodologies & Models
IT Asset Management Capability Maturity Model (CMM)
Measure the maturity of your organization’s IT asset management process and guide its progress from the initial/ad-hoc s...
Subscriber Content
Blog
Sample Audit Reports Available on KnowledgeLeader
KnowledgeLeader's sample audit reports provide you with an outline of how to conduct and report on a variet...
Methodologies & Models
IT Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT governance and to assist its ...
Subscriber Content
Policies & Procedures
Production Equipment Security Policy
Govern the security of your organization’s production equipment used in an internet-facing environment with the best-pra...
Subscriber Content
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Subscriber Content