IT Security

The following 186 items are listed by Content Data.
Audit Programs

IT Organization Audit Work Program

This tool contains two work program samples that highlight best-practice steps for the IT audit process.
Subscriber Content
Mon, May 15, 2023
Audit Programs

Application Controls Audit Work Program

The two samples included in this Application Controls Audit Work Program will help organizations ensure that information...
Subscriber Content
Mon, May 8, 2023
Articles

ISO 27001: 2022 – Key Changes and Approaches to Transition

A look at the changes and updates to the ISO 27001 standard published on October 25, 2022, and the approaches organizati...
Subscriber Content
Mon, Apr 3, 2023
Audit Programs

IT Physical Security Audit Work Program

This work program sample can be used to perform an audit of the physical security of your IT facilities.
Subscriber Content
Mon, Mar 27, 2023
Audit Programs

Firewall Audit Work Program

With this tool, you get four sample work programs designed to provide guidance for your next firewall audit.
Subscriber Content
Mon, Mar 20, 2023
Policies & Procedures

Cellular Phone Policy

Organizations can use this policy to manage cellular phones required for business purposes in a convenient and cost-effe...
Subscriber Content
Mon, Feb 20, 2023
Audit Programs

Database Audit Work Program

This tool includes two sample audit programs that provide steps organizations can take to perform a database administrat...
Subscriber Content
Mon, Feb 13, 2023
Guides

IT Controls and Governance Guide

This guide highlights challenges that may disrupt an organization’s IT governance and provides a road map for activating...
Subscriber Content
Mon, Feb 6, 2023
Policies & Procedures

Building and Data Center Physical Security Policy

This policy sample can be used by organizations to ensure that company buildings and data centers remain secure. 
Subscriber Content
Tue, Jan 17, 2023
Guides

Data Migration Strategy Guide

This guide is designed to help auditors successfully execute a data migration from end to end.
Subscriber Content
Mon, Jan 9, 2023
Policies & Procedures

Background Checks and Confidentiality Policy: Contractors

This policy outlines procedures for extending background checks to temporary personnel and independent contractors.
Subscriber Content
Mon, Dec 19, 2022
Risk & Control Matrices - RCMs

Manage Data Center Operations: Database Management RCM

This document outlines risks and controls common to database management in a risk control matrix (RCM) format.
Subscriber Content
Mon, Dec 12, 2022