信息安全审计的模板……
拿来主义噢
MILY: "Times New Roman"; mso-bidi-font-size: 10.0pt; mso-fareast-font-family: 'MS Mincho'">Audit Policy
1.0 Purpose
To provide the authority for members of <Company Name>'s InfoSec team to conduct a security audit on any system at <Company Name>.
Audits may be conducted to:
· Ensure integrity, confidentiality and availability of information and resources
· Investigate possible security incidents ensure conformance to <Company Name> security policies
· Monitor user or system activity where appropriate.
2.0 Scope
This policy covers all computer and communication devices owned or operated by <Company Name>. This policy also covers any computer and communications device that are present on <Company Name> premises, but which may not be owned or operated by <Company Name>.
3.0 Policy
When requested, and for the purpose of performing an audit, any access needed will be provided to members of <Company Name>'s InfoSec team.
This access may include:
· User level and/or system level access to any computing or communications device
· Access to information (electronic, hardcopy, etc.) that may be produced, transmitted or stored on <Company Name> equipment or premises
· Access to work areas (labs, offices, cubicles, storage areas, etc.)
· Access to interactively monitor and log traffic on <Company Name>.networks.
4.0 Enforcement
Any employee found to have violated this policy may be subject to disciplinary action, up to and including termination of employment.
5.0 Revision History
文章来源于领测软件测试网 https://www.ltesting.net/
版权所有(C) 2003-2010 TestAge(领测软件测试网)|领测国际科技(北京)有限公司|软件测试工程师培训网 All Rights Reserved
北京市海淀区中关村南大街9号北京理工科技大厦1402室 京ICP备2023014753号-2
技术支持和业务联系:info@testage.com.cn 电话:010-51297073