Supportive Publications
See the acronym list for explanations of all acronyms.
12 CFR, Part 30—Appendix A, II (Operational and Managerial Standards), B
AICPA SAS 94 (AU Section 319), Effect of Information Technology on the Auditor's
AICPA, Trust Services
AICPA/CICA, Privacy Framework
ANSI X9.79, U.S. Regulations for Digital Signatures
AS/NZS 4360—1999, Risk Management 1.3.32
Basel Capital Accord (Basel II)
BCI, Good Practice Guidelines
Bill 198, Ontario, Canada, Keeping the Promise for a Strong Economy Act (Budget Measures)
BS 15000-1: 2002, IT Service Management—Part 1: Specification
BS 15000-2: 2003, IT Service Management, Code of Practice for Service Management
BS 7799-3, Risk Management, ISO 27005
Business Continuity Management Good Practice Guidelines, 2005
Canada, Combined Code on Corporate Governance
CERT, OCTAVE
Clinger Cohen Act
CMS Information Security C&A Methodology, Version 1.0
CMS, CSR
CMS, Information Security ARS, Version 2.0
CMS, Information Security Business Risk Assessment Methodology, Version 2.1
CMS, Information Security C&A Methodology, Version 1.0
CMS, Information Security Incident Handling Procedures
CMS, Information Security Risk Assessment Methodology, Version 2.1
CMS, Integrated IT Investment & System Life Cycle Framework
CMS, Policy for the Information Security Program
CMS, Reporting Standard for Information Security Testing, Version 4
CMS, SSP Methodology, 2003
COBIT 4.1, Control Objectives, Management Guidelines, Maturity Models, IT Governance Institute
Commission of the European ...
Get It Compliance And Controls: Best Practices for Implementation now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.