The following 189 items are listed by Content Data.
Audit Reports
IT Risks and Controls Review Report
The objective of this audit report is to reduce the volume of controls across applications, infrastructure and IT proces...
Subscriber Content
Articles
Regulation at the Speed of Innovation: Developing an Adaptive Risk Strategy for Agile and DevOps Environments
DevOps—a concatenation of development and operations—is a fast and flexible approach to developing and delivering softwa...
Subscriber Content
Checklists & Questionnaires
IT Application Control Deficiency Decision Process Questionnaire
This sample helps to determine the severity of any deficiencies cited during the control testing process.
Subscriber Content
Checklists & Questionnaires
IT Infrastructure Control Deficiency Decision Questionnaire
This sample questionnaire helps to determine the severity of any deficiencies cited during the control testing process.
Subscriber Content
Audit Reports
Internal Audit Status Update Report
This sample internal audit report includes a status update to be presented to the audit committee.
Subscriber Content
Checklists & Questionnaires
Control Design Effectiveness Review Checklist
Document reviewers' comments and responses and address financial reporting assertions with our Control Design Effectiven...
Subscriber Content
Memos
SOX IT Testing Planning Memo
This memo captures details for SOX IT testing, including objectives, project scope, transaction types, key risks, coordi...
Subscriber Content
Audit Reports
SAP Change Management Review Audit Report
This sample audit report provides management with an assessment of its current state and associated SAP change managemen...
Subscriber Content
Checklists & Questionnaires
Update Testing: Control Self-Assessment Questionnaire
This questionnaire helps to assess if the controls are operating effectively within a business unit.
Subscriber Content
Checklists & Questionnaires
General IT Controls Review: Passwords Questionnaire
This tool provides questions to consider while reviewing general IT controls password standards.
Subscriber Content
Policies & Procedures
Workstation Use Policy
This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Policies & Procedures
Sensitive Data Handling Policy
The purpose of this policy is to ensure that all sensitively classified data is properly handled whether being transmitt...
Subscriber Content