How to tackle IT audit and compliance

How to tackle IT audit and compliance


IT audit is about the formal verification and validation of the quality and effectiveness of IT
controls to support the overall business control objectives. From a security control
perspective the residual IT security risks are relatively well understood in a network
perimeter protected environment. This perimeter-based protection model has led to an IT
audit practice that has matured into given sets of frameworks, methodologies, approaches,
and models with certain sets of assumptions. CobiT (Control Objectives for Information and
Related Technology) represents such maturity in IT control frameworks and is commonly
referenced among IT auditors.

20 Oct 2011
09 Nov 2010
5 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor