ITGC Expected Evidence Spreadsheet
ITGC Expected Evidence Spreadsheet
* Records of all customer support tickets - Customer support tickets including initial response time, urgent
classification, severity level and owner proving initial response time was in accordance to the SLA
* SLA procedure document - SLA procedure document defining response time to customer issues and
uptime requirements
* Sensitive SaaS applications user list and permissions - Sensitive SaaS application users list and
permissions showing only authorized users have access to these applications
* Cloud accounts users and permissions - Cloud accounts users and permissions showing only authorized
users have access to production
* User access permissions review summary document - A signed document summarizing access
permissions review, including super users / privileged users, by each relevant stakeholder in the
databases, production servers, CI/CD tools and SaaS and Finance applications, including finance folders
* Development and CI/CD tools access permissions configuration - Access permissions settings for
development tools including source control tool, change management tool, CI/CD build tool. The
configuration allows only authorized users to have access to administrative operations
* Change management meeting minutes - Documents outlining subjects discussed, meetings outcomes,
decision logs and produced tasks
* Change management meeting invitations - Email invitations to change management meetings
* Security and operational requirements considerations - Security and operation requirements are being
taken into consideration when a feature developed
* Employee job function change notification ticket - Job function change tickets which are sent to IT
regarding employees whose job functions have been changed during the audit period.Job function change
tickets are to be provided from the Human Resources (HR) system or any other system used for that
matter
* List of employees that had their job function changed - List of employees that had their job function
changed during the audit period
* Access permission list to sensitive SaaS applications - Access permission list to SaaS applications
proving terminated employees has no longer access to these resources
* Terminated employee off-boarding checklist - Employee off-boarding checklist for terminated employees,
including the off-boarding tasks to be performed for a leaving employee such as IT credentials
deprovisioning and equipment disposal. The filled off-boarding checklists can be gathered from the HR or
ticketing system, or be provided as a standalone documents, for terminated employees
* Access permission list to production environments - Access permission active user list proving terminated
employees has no longer access to production
* Terminated employee list - List of terminated employee during the audit period
* Third party signed contracts and privacy compliance reports - Third-party signed contracts or compliance
reports providing third-party entities that need access to the company's private data are committed to
privacy requirements regarding the company
* Change management closed tickets - List of software development closed tickets during the audit period
* Linked tickets and pull requests - Log of changes documentation tickets in the change management tool
and their linkage to pull requests from the source control tool
* SDLC workflow - SDLC workflow from the change management tool showing the flow of software
development processes in the company
* CI/CD tool configuration - Configuration of the CI/CD tool that requires a manual step before a new
version it deployed to production
* List of users with approval permissions - List of users with permissions to approve pull requests merge
* Automatic and manual test results - Logs of automatic acceptance test runs and their results from the
CI/CD tool proving that every build has gone through acceptance testing and halted when tests failed or
manual log of tests and their results
* Configuration of automatic test enforcement - Configuration of automatic tests enforcement for every
build, including failing the build process when tests fail
* Source code vulnerability scans report - Source code vulnerability scan reports presenting found issues
* Source code vulnerability scan configuration - Source code vulnerability scan configuration
* Information security policy document - Information security policy document outlining the information
security program of your company
* Unauthorized access attempts are notified - Unauthorized access attempts are notified by email to
security team
* List of users who have access to sensitive areas - User list holding users who have access to sensitive
areas
* Security monitoring alerts - Security monitoring tool alerts sent to relevant stakeholder
* Security monitoring tool dashboard report - Security monitoring tool dashboard report proving existence
of a dedicated tool
* Security monitoring tool alert rules configuration - Monitoring tool configuration of predefined rules for
alerts sent to relevant stakeholders
* Database backup restoration results - Database backup restoration results showing a successful process
of database backup restoration
* Database backup list - Database backup list showing that backups are performed regularly
* Database automatic backup schedule configuration - Configuration of database automatic backup in the
production environment including backup schedule and data retention
* Backup and disaster recovery policy document - Backup and disaster recovery policy document that
details the company data backup and disaster recovery plan
* Disaster Recovery (DR) drill documentation - Documentation of the disaster recovery process performed
to fully restore the production environment, including production databases and servers. The
documentation should include the steps taken to fully restore the environment, including commands or
scripts that were run, and show that after completing the recovery process, database and server status is
available/running
* Data Retention and Deletion Policy - Data Retention and Deletion policy outlines how long information
(with emphasis on personal data) must be kept and how to dispose of the information when it's no longer
needed.
* Change management policy document - Change management policy document outlining how the
organization designs, handles and carry out changes in the organization, infrastructure, product and
software
* Physical security policy - Physical security policy outlines the physical security measures in order to
prevent unauthorized physical access, damage and interference to the organization’s information and
information processing facilities. The policy should include clear desk and clear screen policy
* Remote access control policy - Remote access control policy outlining and defining acceptable methods
of remotely connecting to the internal network
* SDLC policy document - SDLC policy document outlining the company strategic directions towards
software development processes, including secure software development
* Document classification example - A sample of document classification with inherent / watermark labeling
* Data classification and handling policy document - A data classification and handling policy outlining a
framework for classifying and handling data to ensure that the appropriate degree of protection is applied
to all data held by the organization
* Monitoring and audit policy document - Monitoring and audit policy document that defines the company's
strategic directions for performing business monitoring and internal audit
* Incident response policy document - Incident response policy document that defines how the company
and personnel evaluates, escalates and resolves security incidents
* Data Transfer Policy - Data Transfer policy outlining the guidelines for transporting physical media or
digital media is defined
* Data Breach Policy - Data breach policy
* Set of signed information security policies and procedures - Set of signed information security policies
and procedures available to employees
* A link to the policies and procedures in the internal portal - A link for the internal portal showing that the
policies are available to all company's employees
* Vendor risk management policy document - Vendor risk management policy document that defines how
the company evaluates, engages, and provisions new and existing vendors
* Access control policy - Access control policy outlining how the company designs and manages access
controls
* Asset management policy - Asset management policy outlining the process of receiving, tagging,
documenting, and eventually disposing of the organization's main assets and resource including the
ownership of these assets
* Encryption policy - Encryption policy outline the organization management approach towards the use of
cryptographic controls including key management across the organization's resource and information
* Acceptable use policy - A document outlining expectations from employees behavior towards different
entities
* A malware detection and response policy - A malware detection and response policy outline principles to
prevent malware from entering the company environment, to identify and report on malware or suspected
malware attacks, and to define appropriate actions to eliminate and recover from malware related incidents
* Password policy document - Password policy outlining how the company designs and manages
passwords
* Support metrics dashboard report - Support metrics dashboard report taken from the support software
* Support metrics report notification - A notification with support metrics report sent to relevant
stakeholders
* Vendor risk assessment documentation - Vendor risk assessment reports and documentation for current
and new vendors, including documentation of their compliance reports (SOC 2, etc.) and controls
* Sensitive Saas tools' password policy configuration - Password policy configurations for sensitive SaaS
tools proving a strong password policy is enforced
* Cloud accounts password policy configuration - Password policy configurations for cloud providers
proving a strong password policy is enforced
* PII is used only in production environments - PII is used only in the production environment to prevent
malicious threat actors to gain unauthorized access. Exceptions when necessary should be strictly limited,
defined, and controlled followed by deletion of that data after use
* Cloud accounts users and permissions - Cloud accounts users and permissions showing only authorized
users have access to production
* Test data is removed before system go to production - Test data may give away information about the
functioning of an application or system and is an easy target for unauthorized individuals to exploit to gain
access to systems. Possession of such information could facilitate the compromise of the system and
related account data
* Database access configuration and permissions - Database access user list and permissions proving that
only authorized users has access to the database
* Databases are not publicly accessible - Databases are configured to deny public access from external
networks and allow access originating from the private network
* Databases are configured with IAM authentication - Databases are configured with IAM authentication to
link IAM users and roles with database access
* Consent is obtained from end-users - Consent obtained from end-user prior to collection or disclosure of
personal information to third-party sub-processors
* Change of subcontractor PII processor - In the case of having general written authorization, inform the
customer of any intended changes concerning the addition or replacement of subcontractors to process
PII, thereby giving the customer the opportunity to object to such changes
* Production branches are protected - Production branches are protected in the source control tools
* Source control branch access permissions - Access permissions settings for production related branches
* IAM policies are attached only to groups or roles - Users have no IAM policies directly attached to them,
rather inherit policies from groups and roles
* Users have no IAM policies that allow full administrative privileges - Users have no IAM policies that allow
full administrative privileges, to reduce attach surface and conform to the least privileges principle
* Cloud accounts users and permissions - Cloud accounts users and permissions showing only authorized
users have access to production
Standard Hierarchy Frequency
* Computer Operations and Access to Programs and Data > Define and Manage Service Level >
Ongoing
ITGC.1
* Information Security > User Access Review, Super user access, Sensitive Data Access >
Quarterly
ITGC.10.1
* Information Security > User Access Review, Super user access, Sensitive Data Access >
Ongoing
ITGC.10.2
* Program Development and Program Change > Change Management Request and Design >
Ongoing
ITGC.11.1
* Program Development and Program Change > Change Management Request and Design >
Ongoing
ITGC.11.2
* Program Development and Program Change > Change Management Request and Design >
Ongoing
ITGC.16.1
* Change Management > Change Management Request and Design > ITGC.16.2 Ongoing
* Change Management > Change Management Request and Design > ITGC.16.3 Ongoing
* Program Development and Program Change > Manage changes > ITGC.18 Ongoing
* Program Development and Program Change > Unit and acceptance testing > ITGC.19.1 Ongoing
* Program Development and Program Change > Unit and acceptance testing > ITGC.19.2 Ongoing
* Computer Operations and Access to Programs and Data > Ensure Systems Security >
Ongoing
ITGC.21.1
* Computer Operations and Access to Programs and Data > Ensure Systems Security >
Ongoing
ITGC.21.2
* Data Center and Network Operations > Data/System Restoration > ITGC.23 Annually
* Data Center and Network Operations > Backup Management > ITGC.24 Daily
* Data Center and Network Operations > Operation Policies > ITGC.25.1 Annually
* Data Center and Network Operations > Operation Policies > ITGC.25.2 Ongoing
* Computer Operations and Access to Programs and Data > Manage Third Party Services >
Ongoing
ITGC.26
* Information Security > Information Security Policies > ITGC.3.1 Ongoing
* Computer Operations and Access to Programs and Data > Manage Third Party Services >
Annually
ITGC.5
* Program Development and Program Change > Segregation of Duties (SoD) > ITGC.9 Ongoing