Chapter 8 of the National Industrial Security Program Operating Manual (NISPOM) specifies the security requirements and procedures for information systems that handle classified information. The first Industrial Security Letter that the Defense Security Service issued in2007 expanded on and...
Information_Systems_Security_Checklist.xlsx
1) Obtain a hierarchical representation of the Active Directory structure, beginning with the forest(s). 2) Determine if the forest structure provides for a separation between service administrators (responsible for Active Directory design and highest level of administration) and data...
Active_Directory_Audit_Program.xlsx
This article will illustrate the application of many commonly performed audit tasks. Although the audit procedures shown will be used for tests of fixed assets, many of these same procedures could be used in a variety of situations. For each audit objective listed, the applicable procedures...
WebCAATAuditingFA.pdf
Detailed audit testing steps for computer access and renewal. #IT #Procedures
ComputerAccessRenewalGovernment.doc
Work plan for Windows NT #IT #Procedures
Windows_NT_wp.doc
SAS-70 Review #IT #Procedures
SAS_70_Audit_Program.doc
Peer to peer network security questionaire #IT
ptp_networksecurity_icq.pdf
Detailed workplan for red hat linux #IT #Procedures
RedHatLinuxRel7.rtf
Client Server work program #IT #Procedures
is_wp10_NW_.pdf