The following 186 items are listed by Content Data.
Process Flows
Time Reporting Process Flow
This sample process flow can be used as a general guide to understanding and reviewing the steps in an organization’s ti...
Subscriber Content
Policies & Procedures
Infrastructure Security Policy
Organizations can use this policy to protect critical systems and assets against physical and cyber threats.
Subscriber Content
Policies & Procedures
Data Center Security Policy
This sample policy establishes operational standards for the physical security of a company’s data center.
Subscriber Content
Methodologies & Models
Security Governance Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security governance process and ...
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Policies & Procedures
Security Awareness Policy
This sample policy is designed to help organizations notify information system users about security policies, guidelines...
Subscriber Content
Audit Programs
Enterprise Risk Planning (ERP) Integration Architecture Audit Work Program
This work program template provides steps organizations can take to perform an enterprise risk planning (ERP) integratio...
Subscriber Content
Policies & Procedures
Physical and Environmental Security Policy
This sample policy is designed to help organizations prevent unauthorized access, damage and interference to business pr...
Subscriber Content
Articles
Protiviti's Claire Gotham and Tyler Chase on Powering the City of the Future
As IoT grows exponentially, data platforms will become more important in ensuring that the energy needed to run a city i...
Subscriber Content
Memos
Security Access Badges Memo
This sample memo serves as a report of an internal audit function’s high-level assessment of the security access badges ...
Subscriber Content
Methodologies & Models
Application Performance Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s application performance manageme...
Subscriber Content