The following 112 items are listed by Content Data.
Checklists & Questionnaires
Risk Assessment Questionnaire
Leverage these best-practice risk assessment questions to prepare for annual budgeting and business planning.
Checklists & Questionnaires
System Implementation Process Questionnaire
Meticulously evaluate and manage the various aspects of system implementations and upgrades with the three sample system...
Audit Reports
IT Strategy Assessment Report
Communicate your organization’s IT infrastructure, policies and strategies with this comprehensive audit report sample.
Policies & Procedures
Server Configuration Policy
Use this policy to establish and maintain secure server settings within your company's IT infrastructure.
Audit Reports
IT Audit Update: Audit Committee Report
Utilize this audit report sample to evaluate your organization’s general computer control risks and report on the progre...
Checklists & Questionnaires
Data Center General Controls Questionnaire
Use this questionnaire to meticulously evaluate your mainframe data center's operational controls and enhance security, ...
Audit Programs
System Management Risk Assessment and Control Audit Work Program
This work program will assist audit teams with identifying risks and related controls for logical security administratio...
Guides
IT General Controls Guide
Use the automation and standardization best practices in this guide to enhance IT processes and improve compliance.
Checklists & Questionnaires
IT Disaster Recovery Plan Assessment Checklist
This comprehensive tool includes two sample IT disaster recovery plan checklists with best-practice questions for pre-pl...
Subscriber Content
Audit Programs
IT Application Management Audit Work Program
Enhance your IT application management audit capabilities with our comprehensive work program, tailored for risk assessm...
Subscriber Content
Policies & Procedures
Mobile Device Acceptable Use Policy
This sample policy defines standards, procedures and restrictions for end users required to access corporate data from m...
Subscriber Content
Audit Programs
Security Management Audit Work Program
Use the steps included in this sample work program to conduct an efficient security management audit.
Subscriber Content