Skip to main content

COBIT 2019 Process Assessment Template Tools

 


COBIT® is a broad and comprehensive framework developed to support understanding, designing, and implementing the management and governance of enterprise IT. COBIT defines the components and design factors to build and sustain a best-fit governance system.

COBIT was first released in 1996 by ISACA (Information Systems Audit and Control Association). The latest version, COBIT 2019, was released in 2018. COBIT 5 was published in 2012, and to include new technology and business trends in information and technology (I&T) such as digitization, COBIT 5 was updated to COBIT 2019. New insights from experts in IT and governance were included in the new version.

To assist researchers, assessors, lecturers, and students in assessing the capability level of the COBIT 2019 governance and management processes, here are the COBIT 2019 process assessment template tool (spreadsheet file) based on domains.

  1. EDM (Evaluate, Direct, and Monitor): EDM01 - EDM05 (5 processes), please click https://bit.ly/COBIT2019-EDM
  2. APO (Align, Plan, and Organize): APO01 - APO14 (14 processes), please click https://bit.ly/COBIT2019-APO-New*
  3. BAI (Build, Acquire, and Implement): BAI01 - BAI11 (11 processes), please click https://bit.ly/COBIT2019-BAI*
  4. DSS (Deliver, Service, and Support): DSS01 - DSS06 (6 processes), please click https://bit.ly/COBIT2019-DSS*
  5. MEA (Monitor, Evaluate, and Assess): MEA01 - MEA04 (4 processes), please click https://bit.ly/COBIT2019-MEA*
        *You need permission. Please click Request access.

        Currently, you can download the COBIT 2019 process assessment template tool for the unprotected file version.
        1. EDM (Evaluate, Direct, and Monitor): https://bit.ly/COBIT2019-EDM-Unprotect
        2. APO (Align, Plan, and Organize): https://bit.ly/COBIT2019-APO-Unprotect
        3. BAI (Build, Acquire, and Implement): https://bit.ly/COBIT2019-BAI-Unprotect
        4. DSS (Deliver, Service, and Support): https://bit.ly/COBIT2019-DSS-Unprotect
        5. MEA (Monitor, Evaluate, and Assess): https://bit.ly/COBIT2019-MEA-Unprotect

        Popular posts from this blog

        Principles of Information Security, 6th Edition, 2018

        Introduce the latest technology and developments with the book specifically oriented to the needs of information systems students: Principles of Information Security , Sixth Edition. Taking a managerial approach, this market-leading introductory book emphasizes all the aspects of information security - not just the technical control perspective. Students gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. Students review terms used in the field, a history of the discipline, and an overview of how to manage an information security program. Current and relevant, this edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making it ideal for business decision-makers

        Computer Security Principles and Practice, 3rd Edition, 2016

        Computer Security: Principles and Practice, Third Edition, is ideal for courses in Computer or Network Security. It also provides a solid, up-to-date reference or self-study tutorial for system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists. Chapter: Overview Cryptographic Tools User Authentication Access Control Database and Cloud Security Malicious Software Denial-of-Service Attacks Intrusion Detection Firewalls and Intrusion Prevention Systems Buffer Overflow Software Security Operating System Security Trusted Computing and Multilevel Security IT Security Management and Risk Assessment IT Security Controls, Plans and Procedures Physical and Infrastructure Security Human Resources Security Security Auditing Legal and Ethical Aspects Symmetric Encryption and Message Confidentiality Public-Key Cryptography and Message Authentication Internet Security Protocols and Standards Internet Authenti