The following 189 items are listed by Content Data.
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Methodologies & Models
Enterprise Resource Planning Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s ERP management process and to as...
Subscriber Content
Audit Programs
Enterprise Risk Planning (ERP) Integration Architecture Audit Work Program
This work program template provides steps organizations can take to perform an enterprise risk planning (ERP) integratio...
Subscriber Content
Audit Programs
Configuration Controls Audit Work Program
In this work program sample, we provide general best-practice steps for the configuration controls audit process.
Subscriber Content
Checklists & Questionnaires
IT Change Management Process Questionnaire
Use the questions included in this tool to ensure that all changes to IT resources and infrastructure configurations are...
Subscriber Content
Memos
Sarbanes-Oxley (SOX) Project Approach Memo
This tool contains two sample memos that serve as a report of an internal audit function’s high-level assessment of the ...
Subscriber Content
Methodologies & Models
Change Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s change management process and to...
Subscriber Content
Methodologies & Models
Access Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s access controls process and to a...
Subscriber Content
Policies & Procedures
IT Equipment and Information Control Policy
This policy sample establishes guidelines and procedures common to effective company equipment and system information pr...
Subscriber Content
Methodologies & Models
Identity Access Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s business continuity management p...
Subscriber Content
Policies & Procedures
Systems Audit Logging and Monitoring Policy
This sample policy is designed to help organizations define and comply with system audit logging and monitoring requirem...
Subscriber Content