CIS 349 RANK It's Your Life/cis349rank.com CIS 349 RANK It's Your Life/cis349rank.com | Page 21

Examines the existence of relevant and appropriate security policies Verifies the existence of controls supporting the policies .
Verifies the effective implementation and ongoing monitoring of the controls .
Identify all critical security control points that must be verified throughout the IT infrastructure , and develop a plan that include adequate controls to meet high-level defined control objectives within this organization .
Use at least three ( 3 ) quality resources in this assignment . Note : Wikipedia and similar Websites do not qualify as quality resources .
Be typed , double spaced , using Times New Roman font ( size 12 ), with one-inch margins on all sides ; citations and references must follow APA or school-specific format . Check with your professor for any additional instructions .
Include a cover page containing the title of the assignment , the student ’ s name , the professor ’ s name , the course title , and the date . The cover page and the reference page are not included in the required assignment page length .
The specific course learning outcomes associated with this assignment are :
Explain the use of standards and frameworks in a compliance audit of an IT infrastructure .
Describe the components and basic requirements for creating an audit plan to support business and system considerations .
Describe the parameters required to conduct and report on IT infrastructure audit for organizational compliance .