Use this access control audit checklist to assess and document controls that limit access to information and processing facilities. It covers access control policy, user registration and de-registration, user access provisioning and reviews, management of privileged access and secret authentication information, password quality, secure log-on procedures, information access restrictions, use of privileged utilities, access to program source code, and removal or adjustment of access rights on termination or role change. Ideal for IT and security teams aligning with ISO 27001 style controls. Customize this template to fit your organization and jurisdiction.
With SafetyCulture you can
With SafetyCulture you can
About author
This community page makes available free workplace checklists and templates created by other users within the SafetyCulture community. SafetyCulture has re-published this content and where possible, has credited the original author. SafetyCulture has not verified the accuracy, reliability or suitability of any community content. You agree that your use of any of this content is in accordance with SafetyCulture’s Terms and Conditions .
