The following 311 items are listed by Content Data.
Methodologies & Models
IT Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT governance and to assist its ...
Subscriber Content
Policies & Procedures
Production Equipment Security Policy
Govern the security of your organization’s production equipment used in an internet-facing environment with the best-pra...
Subscriber Content
Policies & Procedures
Internal Lab Security Policy
Use the procedures included in this sample policy to govern the security of your organization’s computer/technical labs.
Subscriber Content
Audit Programs
Security Audit Work Program
Use these audit work program samples to assess the effectiveness of risk management processes and the risk levels relate...
Subscriber Content
Policies & Procedures
Instant Messaging Policy
This policy outlines a set of procedures for the proper use of instant messaging by company employees.
Subscriber Content
Policies & Procedures
Information Security Development Policy
This document provides an outline and framework for creating a set of policies and procedures focused on the organizatio...
Subscriber Content
Policies & Procedures
Information Technology Policy: Role-Based User Management
This sample policy ensures that there are additional controls in place to detect errors and safeguard company computers ...
Subscriber Content
Guides
Service-Level Agreement Guide
This sample document can be used by organizations as a guide to developing and understanding service-level agreements (S...
Subscriber Content
Policies & Procedures
Acceptable Use Policy
This tool contains two sample policies that establish standards and procedures organizations should follow for governing...
Subscriber Content
Guides
Enterprise Risk Assessment Methodology for Internal Audit Plan Development Guide
This guide presents a detailed approach to enterprise risk assessment methodology for internal audit plan development.
Subscriber Content
Policies & Procedures
Help Desk Infrastructure Policy
This policy establishes guidelines to help assign priority levels to problems reported by end users to a company's IT de...
Subscriber Content
Guides
Internal Audit’s Role in Cybersecurity Guide
This document can be used as a guide for understanding internal audit’s role in an organization’s cybersecurity process....
Subscriber Content