The following 139 items are listed by Content Data.
Checklists & Questionnaires
General IT Controls Review: Passwords Questionnaire
This tool provides questions to consider while reviewing general IT controls password standards.
Subscriber Content
Policies & Procedures
Workstation Use Policy
This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Checklists & Questionnaires
Information Security Risk Assessment Questionnaire
This IT risk assessment questionnaire is designed to assist with reviewing and documenting the risk profile of your orga...
Subscriber Content
Audit Reports
Application Access Audit Report
This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Audit Reports
IT System Pre-Implementation Review Audit Report
This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Policies & Procedures
Software Acquisition, Implementation and Maintenance: Application Development and Implementation Policy
The purpose of this sample policy is to control application development and to ensure that application development is ef...
Subscriber Content
Checklists & Questionnaires
IT Due Diligence Questionnaire
This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Checklists & Questionnaires
IT Process Questionnaire: Computer Operations Management
This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Audit Programs
Virtual Private Network (VPN) Administration Audit Work Program
This audit work program includes test steps in the areas of documentation, logging, monitoring and user pool for VPN adm...
Subscriber Content
Risk & Control Matrices - RCMs
Manage IT Assets RCM
This document outlines risks and controls common to the "manage IT assets" process in an RCM format.
Subscriber Content
Risk & Control Matrices - RCMs
Manage Service RCM
This document outlines risks and controls common to the "manage service" process in a risk and control matrix (RCM) form...
Subscriber Content
Audit Programs
UNIX Security Audit Work Program
This audit program outlines steps for reviewing the security of systems running the UNIX operating system.
Subscriber Content