IT Infrastructure

The following 139 items are listed by Content Data.
Checklists & Questionnaires

General IT Controls Review: Passwords Questionnaire

This tool provides questions to consider while reviewing general IT controls password standards.
Subscriber Content
Mon, May 21, 2018
Policies & Procedures

Workstation Use Policy

This sample policy outlines the measures and actions an organization uses to safeguard equipment and information on comp...
Subscriber Content
Mon, Jan 22, 2018
Checklists & Questionnaires

Information Security Risk Assessment Questionnaire

This IT risk assessment questionnaire is designed to assist with reviewing and documenting the risk profile of your orga...
Subscriber Content
Mon, Dec 18, 2017
Audit Reports

Application Access Audit Report

This sample audit report presents the results of an application access audit performed within a company’s IT environment...
Subscriber Content
Mon, Dec 4, 2017
Audit Reports

IT System Pre-Implementation Review Audit Report

This audit report shares findings from a review of the selected processes that support the IQ4 Epic implementation proje...
Subscriber Content
Mon, Nov 27, 2017
Policies & Procedures

Software Acquisition, Implementation and Maintenance: Application Development and Implementation Policy

The purpose of this sample policy is to control application development and to ensure that application development is ef...
Subscriber Content
Mon, Sep 18, 2017
Checklists & Questionnaires

IT Due Diligence Questionnaire

This sample questionnaire evaluates IT management, personnel, contractors, networks, operating systems, applications, ch...
Subscriber Content
Mon, Jun 19, 2017
Checklists & Questionnaires

IT Process Questionnaire: Computer Operations Management

This sample questionnaire evaluates the effectiveness of computer operations management in an organization. Computer ope...
Subscriber Content
Mon, Apr 17, 2017
Audit Programs

Virtual Private Network (VPN) Administration Audit Work Program

This audit work program includes test steps in the areas of documentation, logging, monitoring and user pool for VPN adm...
Subscriber Content
Mon, Nov 7, 2016
Risk & Control Matrices - RCMs

Manage IT Assets RCM

This document outlines risks and controls common to the "manage IT assets" process in an RCM format.
Subscriber Content
Mon, Aug 29, 2016
Risk & Control Matrices - RCMs

Manage Service RCM

This document outlines risks and controls common to the "manage service" process in a risk and control matrix (RCM) form...
Subscriber Content
Mon, Aug 8, 2016
Audit Programs

UNIX Security Audit Work Program

This audit program outlines steps for reviewing the security of systems running the UNIX operating system.
Subscriber Content
Mon, Jun 20, 2016