• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
    • Jan Yeomans
    • Rich
  • Structure
    • Jan’s Syllabus
    • Rich’s Syllabus
  • Schedule
    • First Half of Semester
      • Week 1: IT Governance
      • Week 2: IT’s Role and the Control Environment
      • Week 3: IT Administrative Controls
      • Week 4: Enterprise Architecture
      • Week 5: IT Strategy
      • Week 6: Project Portfolio Management
      • Week 7: Policy
    • Second Half of Semeter
      • Week 8: IT Services and Quality
      • Week 9: IT Outsourcing & Cloud Computing
      • Week 10: Monitoring & Evaluating IT
      • Week 11: IT Risk
      • Week 12: IT Security
      • Week 13: Disaster Recovery & Business Continuity
  • Assignments
    • Policy Project
    • Audit Plan Project
  • Webex
    • Sessions 8/30, 9/6, 9/27, 10/11, 11/1, 11/29
  • HBR Coursepack
  • Gradebook

MIS 5202 IT Governance

Temple University

Remote Access Group – Audit Plan

December 10, 2016 by Loi Van Tran 3 Comments

Team Members: Loi Tran, Sean Walsh, Ahmed Alkaysi,  & Jaspreet Marad

PowerPoint

Audit Plan Document

Presentation Video

Filed Under: Week 14: Maturity Models Tagged With:

Reader Interactions

Comments

  1. Alexander B Olubajo says

    December 16, 2016 at 10:15 pm

    I liked your audit plan, I think it very much covered the basics while being concise. The flow of your audit plan was pretty much consistent and easy to understand. I think what stood out in you plan for me was how you guys went further to create a grading rubric to rate/grade the audit findings/results. I thought it was a good means to communicate the state of the remote access policy to board members of the company.

    Overall, you audit plan is good. Nice work guys!

    Reply
  2. Xiaodi Ji says

    December 17, 2016 at 1:18 am

    I like the format of “controls to examine” which use question to help auditors find out the problems. According to these question, auditors may find out their own answer and find out other solutions for the same question. Then, “Evidence to collect” is good, which auditors can follow them step by step to find out the problems. These solutions are specially focus on their own areas which is highly operational.

    Reply
  3. Mengxue Ni says

    December 17, 2016 at 5:17 pm

    I like your audit plan a lot! The audit process helps me to understand the purpose of this audit. As the audit scope and controls covered part, I like how you guys list out the areas that you are going to review, you even included anti-virus program there. It is very detailed and useful for a remote access policy audit. Every controls that you listed there are necessary to audit and review.

    Reply

Leave a Reply to Xiaodi Ji Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Weekly Discussions

  • Uncategorized (4)
  • Week 01: IT Governance (6)
  • Week 02: IT's Role & the Control Environment (3)
  • Week 03: IT Administrative Controls (2)
  • Week 04: Enterprise Architecture (2)
  • Week 05:IT Strategy (4)
  • Week 06: Project Portfolio Management (2)
  • Week 07: Policy Documents & Video (7)
  • Week 08: IT Services & Quality (2)
  • Week 09: IT Outsourcing & Cloud Computing (2)
  • Week 10: Monitoring & Evaluating IT (3)
  • Week 11: IT Risk (3)
  • Week 12: IT Security (2)
  • Week 13: Disaster Recovery & Business Continuity (1)
  • Week 14: Maturity Models (8)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in