SlideShare a Scribd company logo
1 of 5
Project #4: IT Audit Policy and Plans
Company Background & Operating Environment
Use the assigned case study for information about “the
company.”
Policy Issue & Plan of Action
The corporate board was recently briefed by the Chief
Information Officer concerning the company’s IT Security
Program and how this program contributes to the company’s
risk management strategy. During the briefing, the CIO
presented assessment reports and audit findings from IT
security audits. These audits focused upon the technical
infrastructure and the effectiveness and efficiency of the
company’s implementation of security controls. During the
discussion period, members of the corporate board asked about
audits of policy compliance and assessments as to the degree
that employees were (a) aware of IT security policies and (b)
complying with these policies.
The Chief Information Officer was tasked with providing the
following items to the board before its next quarterly meeting:
(a)
Issue Specific Policy requiring an annual compliance audit for
IT security policies as documented in the company’s Policy
System
(b)
Audit Plan for assessing employee awareness of and compliance
with IT security policies
a.
Are employees aware of the IT security policies in the
Employee Handbook?
b.
Do employees know their responsibilities under those policies?
(c)
Audit Plan for assessing the IT security policy system
a.
Do required policies exist?
b.
Have they been updated within the past year?
c.
Are the policies being reviewed and approved by the
appropriate oversight authorities (managers, IT governance
board, etc.)?
Your Task Assignment
As a staff member supporting the CISO, you have been asked to
research this issue (auditing IT security policy compliance) and
then prepare an “approval draft” for a compliance policy. You
must also research and draft two separate audit plans (a)
employee compliance and (b) policy system audit. The audit
policy should not exceed two typed pages in length so you will
need to be concise in your writing and only include the most
important elements for the policy. Make sure that you include a
requirement for an assessment report to be provided to company
management and the corporate board of directors.
·
For the employee compliance assessment, you must use an
interview strategy which includes 10 or more multiple choice
questions that can be used to construct a web-based survey of
all employees. The questions should be split between (a)
awareness of key policies and (b) awareness of personal
responsibilities in regards to compliance.
·
For the policy system audit, you should use a documentation
assessment strategy which reviews the contents of the
individual policies to determine when the policy was last
updated, who “owns” the policy, who reviewed the policy, and
who approved the policy for implementation.
Research:
1.
Review the weekly readings including the example audit
assessment report.
2.
Review work completed previously in this course which
provides background about the IT Policy System and specific
policies for the case study company.
3.
Find additional resources which discuss IT compliance audits
and/or policy system audits.
Write:
1.
Prepare briefing package with approval drafts of the three
required documents. Place all three documents in a single MS
Word (.doc or .docx) files.
2.
Your
briefing package must contain the following:
·
Executive Summary
·
“Approval Drafts” for
o
Issue Specific Policy for IT Security Policy Compliance Audits
o
Audit Plan for IT Security Policy Awareness & Compliance
(Employee Survey)
o
Audit Plan for IT Security Policies Audit (Documentation
Review)
As you write your policy and audit plans, make sure that you
address security issues using standard cybersecurity
terminology (e.g. 5 Pillars of IA, 5 Pillars of Information
Security). See the resources listed under Course Resources >
Cybersecurity Concepts Review for definitions and terminology.
3.
Use a professional format for your policy documents and
briefing package.
Your policy documents should be consistently formatted and
easy to read.
4.
Common phrases do not require citations. If there is doubt as to
whether or not information requires attribution, provide a
footnote with publication information or use APA format
citations and references.
5.
You are expected to write grammatically correct English in
every assignment that you submit for grading. Do not turn in
any work without (a) using spell check, (b) using grammar
check, (c) verifying that your punctuation is correct and (d)
reviewing your work for correct word usage and correctly
structured sentences and paragraphs.
Submit For Grading
Submit briefing package in MS Word format (.docx or .doc file)
for grading using your assignment folder. (Attach the file.)

More Related Content

Similar to Project #4 IT Audit Policy and PlansCompany Background & Operatin.docx

Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxjacqueliner9
 
Planning an IT Infrastructure Audit for Compliance.docx
Planning an IT Infrastructure Audit for Compliance.docxPlanning an IT Infrastructure Audit for Compliance.docx
Planning an IT Infrastructure Audit for Compliance.docxwrite4
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Enterprise Spice Scope
Enterprise Spice ScopeEnterprise Spice Scope
Enterprise Spice Scopeespice
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxbriancrawford30935
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...eyavagal
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...uopassignment
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...uopassignment
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxmydrynan
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxgasciognecaren
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...matthewtaylorliam12
 
Cis 349 week 10 term paper planning an it infrastructure audit for compliance
Cis 349 week 10 term paper planning an it infrastructure audit for complianceCis 349 week 10 term paper planning an it infrastructure audit for compliance
Cis 349 week 10 term paper planning an it infrastructure audit for complianceshyaminfo4
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...chanduruc123
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security StrategyAndrew Byers
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxKomlin1
 
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxCriteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxwillcoxjanay
 
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docxKey Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docxjesssueann
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managGrazynaBroyles24
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Yerlin Sturdivant
 
The Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmeThe Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmejacvzpline
 

Similar to Project #4 IT Audit Policy and PlansCompany Background & Operatin.docx (20)

Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
 
Planning an IT Infrastructure Audit for Compliance.docx
Planning an IT Infrastructure Audit for Compliance.docxPlanning an IT Infrastructure Audit for Compliance.docx
Planning an IT Infrastructure Audit for Compliance.docx
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
 
Enterprise Spice Scope
Enterprise Spice ScopeEnterprise Spice Scope
Enterprise Spice Scope
 
Project 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docxProject 1Create an application that displays payroll informatio.docx
Project 1Create an application that displays payroll informatio.docx
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
 
Cryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docxCryptography is the application of algorithms to ensure the confiden.docx
Cryptography is the application of algorithms to ensure the confiden.docx
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
 
Cis 349 week 10 term paper planning an it infrastructure audit for compliance
Cis 349 week 10 term paper planning an it infrastructure audit for complianceCis 349 week 10 term paper planning an it infrastructure audit for compliance
Cis 349 week 10 term paper planning an it infrastructure audit for compliance
 
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
Uop cis 349 week 10 term paper planning an it infrastructure audit for compli...
 
Build an Information Security Strategy
Build an Information Security StrategyBuild an Information Security Strategy
Build an Information Security Strategy
 
The Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docxThe Rookie Chief Information Security OfficerThis assignment consi.docx
The Rookie Chief Information Security OfficerThis assignment consi.docx
 
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docxCriteria for Research AssignmentPSCI 1010· The paper is due on.docx
Criteria for Research AssignmentPSCI 1010· The paper is due on.docx
 
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docxKey Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
The Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmeThe Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignme
 

More from dessiechisomjj4

Project 2 Research Paper Compendium                               .docx
Project 2 Research Paper Compendium                               .docxProject 2 Research Paper Compendium                               .docx
Project 2 Research Paper Compendium                               .docxdessiechisomjj4
 
Project 1 Interview Essay Conduct a brief interview with an Asian.docx
Project 1 Interview Essay Conduct a brief interview with an Asian.docxProject 1 Interview Essay Conduct a brief interview with an Asian.docx
Project 1 Interview Essay Conduct a brief interview with an Asian.docxdessiechisomjj4
 
Project 1 Scenario There is a Top Secret intelligence report.docx
Project 1 Scenario There is a Top Secret intelligence report.docxProject 1 Scenario There is a Top Secret intelligence report.docx
Project 1 Scenario There is a Top Secret intelligence report.docxdessiechisomjj4
 
Project #1 Personal Reflection (10)Consider an opinion that you .docx
Project #1 Personal Reflection (10)Consider an opinion that you .docxProject #1 Personal Reflection (10)Consider an opinion that you .docx
Project #1 Personal Reflection (10)Consider an opinion that you .docxdessiechisomjj4
 
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docx
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docxProject 1 Chinese Dialect Exploration and InterviewYou will nee.docx
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docxdessiechisomjj4
 
Project 1 (1-2 pages)What are the employee workplace rights mand.docx
Project 1 (1-2 pages)What are the employee workplace rights mand.docxProject 1 (1-2 pages)What are the employee workplace rights mand.docx
Project 1 (1-2 pages)What are the employee workplace rights mand.docxdessiechisomjj4
 
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docxPROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docxdessiechisomjj4
 
Program must have these things Format currency, total pieces & e.docx
Program must have these things Format currency, total pieces & e.docxProgram must have these things Format currency, total pieces & e.docx
Program must have these things Format currency, total pieces & e.docxdessiechisomjj4
 
Professors Comments1) Only the three body paragraphs were require.docx
Professors Comments1) Only the three body paragraphs were require.docxProfessors Comments1) Only the three body paragraphs were require.docx
Professors Comments1) Only the three body paragraphs were require.docxdessiechisomjj4
 
Program EssayPlease answer essay prompt in a separate 1-page file..docx
Program EssayPlease answer essay prompt in a separate 1-page file..docxProgram EssayPlease answer essay prompt in a separate 1-page file..docx
Program EssayPlease answer essay prompt in a separate 1-page file..docxdessiechisomjj4
 
Program Computing Project 4 builds upon CP3 to develop a program to .docx
Program Computing Project 4 builds upon CP3 to develop a program to .docxProgram Computing Project 4 builds upon CP3 to develop a program to .docx
Program Computing Project 4 builds upon CP3 to develop a program to .docxdessiechisomjj4
 
Project 1 Resource Research and ReviewNo directly quoted material.docx
Project 1 Resource Research and ReviewNo directly quoted material.docxProject 1 Resource Research and ReviewNo directly quoted material.docx
Project 1 Resource Research and ReviewNo directly quoted material.docxdessiechisomjj4
 
Professionalism Assignment I would like for you to put together yo.docx
Professionalism Assignment I would like for you to put together yo.docxProfessionalism Assignment I would like for you to put together yo.docx
Professionalism Assignment I would like for you to put together yo.docxdessiechisomjj4
 
Professor Drebins Executive MBA students were recently discussing t.docx
Professor Drebins Executive MBA students were recently discussing t.docxProfessor Drebins Executive MBA students were recently discussing t.docx
Professor Drebins Executive MBA students were recently discussing t.docxdessiechisomjj4
 
Professional Legal Issues with Medical and Nursing Professionals  .docx
Professional Legal Issues with Medical and Nursing Professionals  .docxProfessional Legal Issues with Medical and Nursing Professionals  .docx
Professional Legal Issues with Medical and Nursing Professionals  .docxdessiechisomjj4
 
Prof Washington, ScenarioHere is another assignment I need help wi.docx
Prof Washington, ScenarioHere is another assignment I need help wi.docxProf Washington, ScenarioHere is another assignment I need help wi.docx
Prof Washington, ScenarioHere is another assignment I need help wi.docxdessiechisomjj4
 
Prof James Kelvin onlyIts just this one and simple question 1.docx
Prof James Kelvin onlyIts just this one and simple question 1.docxProf James Kelvin onlyIts just this one and simple question 1.docx
Prof James Kelvin onlyIts just this one and simple question 1.docxdessiechisomjj4
 
Product life cycle for album and single . sales vs time ( 2 pa.docx
Product life cycle for album and single . sales vs time ( 2 pa.docxProduct life cycle for album and single . sales vs time ( 2 pa.docx
Product life cycle for album and single . sales vs time ( 2 pa.docxdessiechisomjj4
 
Produce the following components as the final draft of your health p.docx
Produce the following components as the final draft of your health p.docxProduce the following components as the final draft of your health p.docx
Produce the following components as the final draft of your health p.docxdessiechisomjj4
 
Produce a preparedness proposal the will recommend specific steps th.docx
Produce a preparedness proposal the will recommend specific steps th.docxProduce a preparedness proposal the will recommend specific steps th.docx
Produce a preparedness proposal the will recommend specific steps th.docxdessiechisomjj4
 

More from dessiechisomjj4 (20)

Project 2 Research Paper Compendium                               .docx
Project 2 Research Paper Compendium                               .docxProject 2 Research Paper Compendium                               .docx
Project 2 Research Paper Compendium                               .docx
 
Project 1 Interview Essay Conduct a brief interview with an Asian.docx
Project 1 Interview Essay Conduct a brief interview with an Asian.docxProject 1 Interview Essay Conduct a brief interview with an Asian.docx
Project 1 Interview Essay Conduct a brief interview with an Asian.docx
 
Project 1 Scenario There is a Top Secret intelligence report.docx
Project 1 Scenario There is a Top Secret intelligence report.docxProject 1 Scenario There is a Top Secret intelligence report.docx
Project 1 Scenario There is a Top Secret intelligence report.docx
 
Project #1 Personal Reflection (10)Consider an opinion that you .docx
Project #1 Personal Reflection (10)Consider an opinion that you .docxProject #1 Personal Reflection (10)Consider an opinion that you .docx
Project #1 Personal Reflection (10)Consider an opinion that you .docx
 
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docx
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docxProject 1 Chinese Dialect Exploration and InterviewYou will nee.docx
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docx
 
Project 1 (1-2 pages)What are the employee workplace rights mand.docx
Project 1 (1-2 pages)What are the employee workplace rights mand.docxProject 1 (1-2 pages)What are the employee workplace rights mand.docx
Project 1 (1-2 pages)What are the employee workplace rights mand.docx
 
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docxPROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
 
Program must have these things Format currency, total pieces & e.docx
Program must have these things Format currency, total pieces & e.docxProgram must have these things Format currency, total pieces & e.docx
Program must have these things Format currency, total pieces & e.docx
 
Professors Comments1) Only the three body paragraphs were require.docx
Professors Comments1) Only the three body paragraphs were require.docxProfessors Comments1) Only the three body paragraphs were require.docx
Professors Comments1) Only the three body paragraphs were require.docx
 
Program EssayPlease answer essay prompt in a separate 1-page file..docx
Program EssayPlease answer essay prompt in a separate 1-page file..docxProgram EssayPlease answer essay prompt in a separate 1-page file..docx
Program EssayPlease answer essay prompt in a separate 1-page file..docx
 
Program Computing Project 4 builds upon CP3 to develop a program to .docx
Program Computing Project 4 builds upon CP3 to develop a program to .docxProgram Computing Project 4 builds upon CP3 to develop a program to .docx
Program Computing Project 4 builds upon CP3 to develop a program to .docx
 
Project 1 Resource Research and ReviewNo directly quoted material.docx
Project 1 Resource Research and ReviewNo directly quoted material.docxProject 1 Resource Research and ReviewNo directly quoted material.docx
Project 1 Resource Research and ReviewNo directly quoted material.docx
 
Professionalism Assignment I would like for you to put together yo.docx
Professionalism Assignment I would like for you to put together yo.docxProfessionalism Assignment I would like for you to put together yo.docx
Professionalism Assignment I would like for you to put together yo.docx
 
Professor Drebins Executive MBA students were recently discussing t.docx
Professor Drebins Executive MBA students were recently discussing t.docxProfessor Drebins Executive MBA students were recently discussing t.docx
Professor Drebins Executive MBA students were recently discussing t.docx
 
Professional Legal Issues with Medical and Nursing Professionals  .docx
Professional Legal Issues with Medical and Nursing Professionals  .docxProfessional Legal Issues with Medical and Nursing Professionals  .docx
Professional Legal Issues with Medical and Nursing Professionals  .docx
 
Prof Washington, ScenarioHere is another assignment I need help wi.docx
Prof Washington, ScenarioHere is another assignment I need help wi.docxProf Washington, ScenarioHere is another assignment I need help wi.docx
Prof Washington, ScenarioHere is another assignment I need help wi.docx
 
Prof James Kelvin onlyIts just this one and simple question 1.docx
Prof James Kelvin onlyIts just this one and simple question 1.docxProf James Kelvin onlyIts just this one and simple question 1.docx
Prof James Kelvin onlyIts just this one and simple question 1.docx
 
Product life cycle for album and single . sales vs time ( 2 pa.docx
Product life cycle for album and single . sales vs time ( 2 pa.docxProduct life cycle for album and single . sales vs time ( 2 pa.docx
Product life cycle for album and single . sales vs time ( 2 pa.docx
 
Produce the following components as the final draft of your health p.docx
Produce the following components as the final draft of your health p.docxProduce the following components as the final draft of your health p.docx
Produce the following components as the final draft of your health p.docx
 
Produce a preparedness proposal the will recommend specific steps th.docx
Produce a preparedness proposal the will recommend specific steps th.docxProduce a preparedness proposal the will recommend specific steps th.docx
Produce a preparedness proposal the will recommend specific steps th.docx
 

Recently uploaded

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 

Project #4 IT Audit Policy and PlansCompany Background & Operatin.docx

  • 1. Project #4: IT Audit Policy and Plans Company Background & Operating Environment Use the assigned case study for information about “the company.” Policy Issue & Plan of Action The corporate board was recently briefed by the Chief Information Officer concerning the company’s IT Security Program and how this program contributes to the company’s risk management strategy. During the briefing, the CIO presented assessment reports and audit findings from IT security audits. These audits focused upon the technical infrastructure and the effectiveness and efficiency of the company’s implementation of security controls. During the discussion period, members of the corporate board asked about audits of policy compliance and assessments as to the degree that employees were (a) aware of IT security policies and (b) complying with these policies. The Chief Information Officer was tasked with providing the following items to the board before its next quarterly meeting: (a) Issue Specific Policy requiring an annual compliance audit for IT security policies as documented in the company’s Policy System (b) Audit Plan for assessing employee awareness of and compliance with IT security policies a. Are employees aware of the IT security policies in the Employee Handbook? b.
  • 2. Do employees know their responsibilities under those policies? (c) Audit Plan for assessing the IT security policy system a. Do required policies exist? b. Have they been updated within the past year? c. Are the policies being reviewed and approved by the appropriate oversight authorities (managers, IT governance board, etc.)? Your Task Assignment As a staff member supporting the CISO, you have been asked to research this issue (auditing IT security policy compliance) and then prepare an “approval draft” for a compliance policy. You must also research and draft two separate audit plans (a) employee compliance and (b) policy system audit. The audit policy should not exceed two typed pages in length so you will need to be concise in your writing and only include the most important elements for the policy. Make sure that you include a requirement for an assessment report to be provided to company management and the corporate board of directors. · For the employee compliance assessment, you must use an interview strategy which includes 10 or more multiple choice questions that can be used to construct a web-based survey of all employees. The questions should be split between (a) awareness of key policies and (b) awareness of personal responsibilities in regards to compliance. ·
  • 3. For the policy system audit, you should use a documentation assessment strategy which reviews the contents of the individual policies to determine when the policy was last updated, who “owns” the policy, who reviewed the policy, and who approved the policy for implementation. Research: 1. Review the weekly readings including the example audit assessment report. 2. Review work completed previously in this course which provides background about the IT Policy System and specific policies for the case study company. 3. Find additional resources which discuss IT compliance audits and/or policy system audits. Write: 1. Prepare briefing package with approval drafts of the three required documents. Place all three documents in a single MS Word (.doc or .docx) files. 2. Your briefing package must contain the following: · Executive Summary · “Approval Drafts” for
  • 4. o Issue Specific Policy for IT Security Policy Compliance Audits o Audit Plan for IT Security Policy Awareness & Compliance (Employee Survey) o Audit Plan for IT Security Policies Audit (Documentation Review) As you write your policy and audit plans, make sure that you address security issues using standard cybersecurity terminology (e.g. 5 Pillars of IA, 5 Pillars of Information Security). See the resources listed under Course Resources > Cybersecurity Concepts Review for definitions and terminology. 3. Use a professional format for your policy documents and briefing package. Your policy documents should be consistently formatted and easy to read. 4. Common phrases do not require citations. If there is doubt as to whether or not information requires attribution, provide a footnote with publication information or use APA format citations and references. 5. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly
  • 5. structured sentences and paragraphs. Submit For Grading Submit briefing package in MS Word format (.docx or .doc file) for grading using your assignment folder. (Attach the file.)