The following 186 items are listed by Content Data.
Policies & Procedures
IT Personnel Security Policy
This tool contains two sample policies that define the security standards that must be applied regarding personnel.
Audit Reports
Identity Access Management Report
Improve your identity and access management processes with the governance and infrastructure enhancements in this audit ...
Articles
Confessions of an Ethical Hacker: “I Could Break Into Any Company, All It Takes Is Time”
What C-level executives and board members can do to protect their businesses from attacks and what cybersecurity looks l...
Policies & Procedures
Third-Party Access Policy
This tool contains two sample policies that outline procedures governing third-party access to company-owned networks an...
Audit Programs
EDI Audit Work Program
Explore our EDI Audit Work Program to master the setup, testing and oversight of secure data exchanges between clients a...
Policies & Procedures
System, Database and Application Administrator Policy
Define the roles, activities and responsibilities of administrators regarding access rights to applications running on c...
Checklists & Questionnaires
System Implementation Process Questionnaire
Meticulously evaluate and manage the various aspects of system implementations and upgrades with the three sample system...
Policies & Procedures
IT System Access and Re-Certification Policy
Secure your digital infrastructure and maintain proper system access security with our sample IT access policy.
Audit Programs
System Intrusion Audit Work Program
Using the best practices in this audit program sample, you can evaluate your organization’s ability to detect unauthoriz...
Policies & Procedures
Server Configuration Policy
Use this policy to establish and maintain secure server settings within your company's IT infrastructure.
Policies & Procedures
Data Security Policy
Download the best-practice procedures in this policy, including classification, encryption, access control and secure st...
Policies & Procedures
Remote Network Access Policy
This sample policy defines the conditions under which an employee, contractor, vendor, or other person may have remote a...