IT Risk Management - Simple. Powerful. Refined.
Menu
  •  

  • IT Risk Assessment

    start with a strong foundation  

    Now Available

  • Compliance Assessment

    navigate regulations like a pro  

    Coming Soon

  • Control-2-Framework Mapper

    keep your controls on course  

    Coming Soon

  • SANS Top 20 Mapper

    analyze your progress  

    Coming Soon

  • Control Framework Assessment

    put your policies in perspective  

    Coming Soon

  • IT Policy Reviewer

    know where you stand  

    Coming Soon

  • Audit Program Generator

    manage with dynamic intelligence  

    Coming Soon

  • IT Audit & Security Utilities

    take action without breaking the bank  

    Coming Soon

  • Findings Repository

    save time with expertly prepared reports  

    Coming Soon

  • Ask an Expert

    get advice when you need it  

    Coming Soon

  1. Overview
  2. Details
  3. Features
  4. Resources

One of the easiest ways to reduce operating costs is to make sure you aren’t reinventing the wheel. We’ve been in the IT security audit business for almost two decades, and we can assure you that almost every possible iteration of IT audit or security findings have already been reported by someone at a very detailed level.

What does this mean for you? You don’t have to prepare IT audit or security findings from scratch ever again. We’ve gathered a repository of comprehensive, professional, expert findings. All you have to do is search for the prepared, reviewed and approved IT audit or security findings that suit your needs.

Our IT security and audit findings repository contains multiple findings, associated risks, and actionable items across dozens of categories. Once you identify what you need, you can edit the text online and export the final copy for inclusion in your IT audit report.

scGRC.com and our community of IT audit and security experts are always looking for high quality findings. If you have findings to share, please consider becoming a paid contributor.

Our findings are broken down into the following categories.

Technology Processes

  • Asset Management
  • Automated Monitoring
  • Backups
  • Business and IS Alignment
  • Capacity Planning
  • Change Management
  • Configuration Management
  • Disaster Recovery
  • Environmental Controls
  • IS Segregation of Duties
  • Patch Management
  • Physical Security
  • Production Job Management
  • Project Management
  • Remote Access Management
  • Risk Management
  • Server Management
  • System Development Life Cycle
  • Software Compliance
  • User Access Provisioning
  • User Training
  • Vulnerability Management

Technology Specific

  • Database Security

Compliance

  • HIPAA Security Rule

Detailed findings in a fraction of the time – Search and edit and you’re done!

Expert findings without expert prices – Our findings have been reviewed and approved by IT audit and security subject matter experts. Take advantage of their knowledge and effort at a fraction of the cost of having an expert on site.

Share the information – Our reports make it easy for you to identify action items and share the information with decision makers in your organization. 

Contact us for detailed information about any of our tools and information about our subscription or partnership plans.

Request a free demo and see how our tools can benefit your business.

If you have findings to share, contact us about becoming a paid contributor.

Login
Request a Demo
See our tools in action and experience the power of efficiency.


* Required