Supportive Publications

See the acronym list for explanations of all acronyms.

12 CFR, Part 30—Appendix A, II (Operational and Managerial Standards), B

AICPA SAS 94 (AU Section 319), Effect of Information Technology on the Auditor's

AICPA, Trust Services

AICPA/CICA, Privacy Framework

ANSI X9.79, U.S. Regulations for Digital Signatures

AS/NZS 4360—1999, Risk Management 1.3.32

Basel Capital Accord (Basel II)

BCI, Good Practice Guidelines

Bill 198, Ontario, Canada, Keeping the Promise for a Strong Economy Act (Budget Measures)

BS 15000-1: 2002, IT Service Management—Part 1: Specification

BS 15000-2: 2003, IT Service Management, Code of Practice for Service Management

BS 7799-3, Risk Management, ISO 27005

Business Continuity Management Good Practice Guidelines, 2005

Canada, Combined Code on Corporate Governance

CERT, OCTAVE

Clinger Cohen Act

CMS Information Security C&A Methodology, Version 1.0

CMS, CSR

CMS, Information Security ARS, Version 2.0

CMS, Information Security Business Risk Assessment Methodology, Version 2.1

CMS, Information Security C&A Methodology, Version 1.0

CMS, Information Security Incident Handling Procedures

CMS, Information Security Risk Assessment Methodology, Version 2.1

CMS, Integrated IT Investment & System Life Cycle Framework

CMS, Policy for the Information Security Program

CMS, Reporting Standard for Information Security Testing, Version 4

CMS, SSP Methodology, 2003

COBIT 4.1, Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute

Commission of the European ...

Get It Compliance And Controls: Best Practices for Implementation now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.