Documents, Policies, Etc

Use this template policies, standards and procedures to document how Internal Controls should be designed, build and most importantly systematcially operated. These documents link to Internal Controls and Compliance Requirements.

32

0%
Current Policies

0

0%
New Policies

0

0%
Updated Policies
Actions
Title
Short Description
Version
Internal Controls
Change Management Procedure
This procedure describes the steps required to change any piece of technological equipment.
1.2
DMZ Firewall Reviews Standard Server Build - Windows Change Mgt Reviews AD Group Reviews Backups High Privilege Service Accounts Policy Password Configuration Service Accounts Reviews Standard Server Build - Linux Employee Account Provisioning and Deprovisioning Review
Hardening Standards
This document describes the hardening standards that must be applied to end-point systems networks OS; software; encryption and applications.
1.4
Regular Vulnerability Scanning Endpoint Hardware Inventory DMZ Firewall Reviews Standard Server Build - Windows CRM Application - Account Reviews Change Mgt Reviews AD Group Reviews IDS Reviews Google Apps 2-Factor Database Administrator Account Reviews Dual Factor Authentication Log Reviews Policy Password Configuration Rogue Wifi APs Service Accounts Reviews Standard Server Build - Linux System Patching WPA2 Secured Wifi Networks VPN Access Anti-Malware Software Reviews Network Device Hardening Reviews End-Point Reviews Application Hardening Standards
Logging & Monitoring Standards
This document describes logging and audit trails requirements for systems and applications
1.3
DMZ Firewall Reviews CRM Application - Account Reviews Change Mgt Reviews AD Group Reviews Database Administrator Account Reviews High Privilege Service Accounts Log Reviews Policy Password Configuration VPN Access Log Reviews