This document is an audit program for reviewing logical security controls on operating systems. It contains audit steps organized into sections on system understanding, security management, security administration, system configuration, and security system configuration if third-party security software is used. The audit steps are designed to evaluate policies, procedures, configuration settings, and other controls to ensure compliance with standards and best practices.