The following 247 items are listed by Content Data.
Audit Programs
Firewall Audit Work Program
This tool contains four sample work programs that provide general steps organizations can use for conducting a firewall ...
Subscriber Content
Methodologies & Models
IT General Controls Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT general controls and to assis...
Subscriber Content
Methodologies & Models
IT Support Service Desk Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s IT support service desk manageme...
Subscriber Content
Policies & Procedures
Information Technology (IT) Security Policy
This document contains three sample policies that establish guidelines an organization should follow to ensure that its ...
Subscriber Content
Methodologies & Models
Security Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security management process and ...
Subscriber Content
Audit Programs
Network Device Configuration Management Audit Work Program
This work program template highlights general steps an organization should follow with respect to effective network devi...
Subscriber Content
Methodologies & Models
Security Risk Management Capability Maturity Model (CMM)
This capability maturity model can be used to measure the maturity of an organization’s security risk management process...
Subscriber Content
Policies & Procedures
Firewall Administration Policy
This tool contains two policies that establish procedures and requirements to ensure the appropriate protection and cont...
Subscriber Content
Policies & Procedures
Security Incident Policy
This policy can be used to employ system-monitoring tools that will automatically email or page IT department personnel ...
Subscriber Content
Articles
Protiviti's Claire Gotham and Tyler Chase on Powering the City of the Future
As IoT grows exponentially, data platforms will become more important in ensuring that the energy needed to run a city i...
Subscriber Content
Policies & Procedures
Password Security Policy
This tool contains four sample policies that establish a company’s guidelines regarding secure and consistent system pas...
Subscriber Content
Policies & Procedures
IT Contingency Planning Policy
The purpose of this policy is to ensure that information system resources and business processes are protected against s...
Subscriber Content