P. 1
IT Security Audit Policy

IT Security Audit Policy

|Views: 835|Likes:
Publicado porchiragi

More info:

Published by: chiragi on Jul 11, 2009
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





“Program listing must be controlled and kept fully up to date at all time.”

Controlling includes taking printouts, reports, electronic or hard copy of the application
source code that makes up the programs run on the systems.
Information security issues to be considered when, implementing the policy, include
the following:

IT Security & Audit Policy Page 37 of 91


Loss or unavailability of a listing can result in delays in identifying the source of
a system problem, the result of which could be severe.


Having a program listing available can be used by anyone with ill intent or
seeking to defraud, as it gives them the precise logic and routines for the
system in question.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->