Security Management Audit Work Program

Subscriber Content
Screenshot of the first page of Security Management Audit Work Program-page-001

This tool contains two sample work programs that provide general steps organizations can take when conducting a security management audit.

Sample work steps include determining how many IDs are set up on the legacy systems and how many users actively use these systems, determining if a separate security administration function exists, documenting the direct report for the security administration function, asking if the company has an information security policy, asking if passwords are generated by each user rather than assigned by the company, and discussing the IT organization’s ability to control the integrity of its resources.

Free Trial

Sign up for a free, no-obligation trial to start exploring our timesaving, valuable resources.