Each week via Twitter we post a daily audit checklist tweet for all the IS auditors and security administrators out there in the tweet-o-sphere. But, we realize not everyone is ready for Twitter, and many of you are still resisting (you can keep trying, but eventually you will give in and start tweeting, everyone will eventually…), so we’ve decided to start posting them in our blog as well. So once each week we’ll post the audit checklists and audit tools that we posted into Twitter here in our blog as well. This way everyone will have a chance to enjoy all the audit fun!

This last week we focused back to process controls and operational assurance. We listed checklists to help auditors evaluate an organization’s stance on privacy based issues. We also listed out tools that exist to help an organization to better manage their audit program. Many of this past week’s tools were commercial, but sometimes those can be the best tool for the job.

This upcoming week will focus on additional operational controls, and we’ll through in some choices for vulnerability assessment along the way.

Privacy Audit Checklists & Security Guides:

Privacy Checklist #1

Privacy Checklist #2

Privacy Checklist #3

Privacy Checklist #4

Privacy Checklist #5

Tools for Audit Program Management:  

Archer Technologies



Paisley Enterprise GRC

Pentana Audit Work System (Old Link Removed)

We hope everyone will enjoy and use these tools this week. If you have suggestions or ideas for future audit checklists or tools, please let us know, we’d love to hear your feedback.