{"id":11668,"date":"2021-06-07T03:50:00","date_gmt":"2021-06-07T03:50:00","guid":{"rendered":"https:\/\/www.walkme.com\/blog\/?p=11668"},"modified":"2023-05-08T07:59:48","modified_gmt":"2023-05-08T07:59:48","slug":"it-audit","status":"publish","type":"post","link":"https:\/\/www.walkme.com\/blog\/it-audit\/","title":{"rendered":"How to Plan and Use an IT Audit Checklist"},"content":{"rendered":"\n<p>An IT audit needs to cover a few essential elements in order to effectively assess and evaluate existing IT processes. Having an IT audit checklist can simplify this process and ensure that no key pieces are left out.<\/p>\n\n\n\n<p>In this post, we\u2019ll learn what an IT audit should encompass and what elements must be included in your checklist.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to plan and use an IT audit checklist<\/strong><\/h2>\n\n\n\n<p>IT audits are designed to ensure an organization\u2019s IT infrastructure, systems, and procedures are aligned with recognized standards and, most importantly, the organization\u2019s objectives.&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Planning<\/strong><\/h3>\n\n\n\n<p>During the initial research stage, <a href=\"https:\/\/www2.deloitte.com\/mt\/en\/pages\/risk\/articles\/mt-risk-article-it-auditing-process.html\" target=\"_blank\" rel=\"noreferrer noopener\">Deloitte<\/a> suggests that auditors work with IT personnel to first understand the IT environment, risks, and the resources required.<\/p>\n\n\n\n<p>Having an understanding of the IT department\u2019s core controls and procedures, such as <a href=\"https:\/\/www.walkme.com\/glossary\/itsm\/?t=21&amp;camp=walkme-blog\" target=\"_blank\" rel=\"noreferrer noopener\">ITSM<\/a> change management, security, and <a href=\"https:\/\/www.walkme.com\/solutions\/use-case\/business-continuity\/?t=21&amp;camp=walkme-blog\" target=\"_blank\" rel=\"noreferrer noopener\">business continuity<\/a> will ensure that the auditors can actually draw the correct conclusions from their work.<\/p>\n\n\n\n<p>During this stage, it is also crucial to define the audit scope, since not all audits cover the same areas. Some are focused on <a href=\"https:\/\/www.digital-adoption.com\/cybersecurity\/?t=21&amp;camp=walkme-blog\" target=\"_blank\" rel=\"noreferrer noopener\">cybersecurity<\/a>, while others are focused on IT governance, and yet others may focus on specific applications or processes.<\/p>\n\n\n\n<p>With all of that in mind, auditors can then plan and execute the audit.<\/p>\n\n\n\n<p>Here are the key checklist items to include at this stage:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Understand the organization, its context, and its strategy<\/strong><\/li><li><strong>Define the scope of the IT audit universe and the components to evaluate<\/strong><\/li><li><strong>Assess the risks of the IT audit universe<\/strong><\/li><li><strong>Validate the plan<\/strong><\/li><\/ul>\n\n\n\n<p>Having an actual framework to use when performing the audit can also go a long way towards simplifying the audit process and ensuring that it is thorough and that it meets its objectives.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Risk factors to audit<\/strong><\/h3>\n\n\n\n<p>The exact process and nature of the audit will depend on the audit scope, as mentioned. Defining that scope and the important points to cover, however, can be daunting without guidance.&nbsp;<\/p>\n\n\n\n<p><a href=\"https:\/\/www.isaca.org\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ISACA<\/a> is the best resource to turn to when planning an IT audit since they develop IT frameworks that focus on governance and auditing. <a href=\"https:\/\/www.isaca.org\/bookstore\/audit-control-and-security-essentials\/witaf4?cid=pr_2005556&amp;Appeal=pr\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ITAF <\/a>is their framework that focuses on IT auditing best practices.<\/p>\n\n\n\n<p>Another useful framework is one developed by ISACA in 1996, called <a href=\"https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2019\/volume-3\/developing-the-it-audit-plan-using-cobit-2019\" target=\"_blank\" rel=\"noreferrer noopener\">C<\/a><a href=\"https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2019\/volume-3\/developing-the-it-audit-plan-using-cobit-2019\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">O<\/a><a href=\"https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2019\/volume-3\/developing-the-it-audit-plan-using-cobit-2019\" target=\"_blank\" rel=\"noreferrer noopener\">BIT<\/a>. The first edition of this framework focused specifically on auditing, but over the years, it has expanded into a complete <a href=\"https:\/\/www.walkme.com\/blog\/cobit-vs-itil-vs-other-it-frameworks\/\" target=\"_blank\" rel=\"noreferrer noopener\">IT governance framework<\/a> designed to help align IT with business objectives.&nbsp;<\/p>\n\n\n\n<p>When performing a complete top-down audit of IT, including <a href=\"https:\/\/www.walkme.com\/blog\/risk-management-framework\/\" target=\"_blank\" rel=\"noreferrer noopener\">risk management<\/a> and IT governance systems, COBIT can be a very useful resource.<\/p>\n\n\n\n<p>According to ISACA, COBIT design factors can be used synonymously with IT risk factors.<\/p>\n\n\n\n<p>These factors include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Enterprise strategy<\/strong><\/li><li><strong>Enterprise goals<\/strong><\/li><li><strong>A risk profile<\/strong><\/li><li><strong>I&amp;T-related issues<\/strong><\/li><li><strong>The threat landscape<\/strong><\/li><li><strong>Compliance requirements<\/strong><\/li><li><strong>The role of IT<\/strong><\/li><li><strong>The source model for IT<\/strong><\/li><li><strong>IT implementation methods<\/strong><\/li><li><strong>A technology adoption strategy<\/strong><\/li><li><strong>Enterprise size<\/strong><\/li><\/ul>\n\n\n\n<p>The scope of the audit will naturally determine which of these factors are to be evaluated and which are to be excluded.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Components and scoring<\/strong><\/h3>\n\n\n\n<p>COBIT\u2019s latest iteration, COBIT 2019, also provides seven specific components that can be used to describe, in detail, a given goal of an audit process.<\/p>\n\n\n\n<p>These include:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Processes<\/strong><\/li><li><strong>Organizational structures<\/strong><\/li><li><strong>Principles, policies, and frameworks<\/strong><\/li><li><strong>Information<\/strong><\/li><li><strong>Culture, ethics, and behavior<\/strong><\/li><li><strong>People, skills, and competencies<\/strong><\/li><li><strong>Services, infrastructure, and applications<\/strong><\/li><\/ul>\n\n\n\n<p>Each of these seven components can be further tailored to meet the specific needs of the audit and the organization.<\/p>\n\n\n\n<p>When evaluating each component, consider employing <a href=\"https:\/\/www.isaca.org\/resources\/news-and-trends\/industry-news\/2020\/cobit-and-it-audit-a-partnership-for-eternity\" target=\"_blank\" rel=\"noreferrer noopener\">COBIT\u2019s process maturity scale<\/a>, which scores processes on a six-point scale:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>0<\/strong>.<strong> <\/strong>Lacks even basic capabilities.<\/li><li><strong>1. <\/strong>Not very organized, but the process does achieve its purpose.<\/li><li><strong>2.<\/strong> The process completes its basic purpose through activities characterized as \u201cperformed.\u201d<\/li><li><strong>3. <\/strong>The process is more organized and leverages organizational assets.<\/li><li><strong>4. <\/strong>The process is clearly defined and measured.<\/li><li><strong>5. <\/strong>The process is defined, measured, and undergoing continual improvement.<\/li><\/ul>\n\n\n\n<p>These scores should be compared to the desired outcomes that were previously defined by the organization\u2019s IT governance system, and those results should then be compiled into a report.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Concluding the audit<\/strong><\/h3>\n\n\n\n<p>Once the audit process has been completed, the results should be compiled into a report and presented to the proper stakeholders.<\/p>\n\n\n\n<p>When auditors create this report, it is important to clearly document every aspect of their process, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>The audit plan, scope, and objectives<\/strong><\/li><li><strong>The audit methodology<\/strong><\/li><li><strong>The audit engagements and operations<\/strong><\/li><li><strong>The outcomes of the audit<\/strong><\/li><\/ul>\n\n\n\n<p>An audit report is the final step in the process and will provide all the information necessary to anyone unfamiliar with the process, its purpose, or its findings. Clear documentation of the process can also be used to ensure that proper audit procedures were followed and no key points were omitted.<\/p>\n\n\n\n<a href=\"javascript:;\" class=\"popup-threefields m-element-hidden j-initiator j-paid_post_feature\" id=\"imgpng\" form-type-id=\"imgpng\"><img decoding=\"async\" class=\"initiator-image\" src=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2023\/04\/Change-Management-A-min_8643bf07.png\"\/><\/a>\n","protected":false},"excerpt":{"rendered":"An IT audit needs to cover a few essential elements in order to effectively assess and evaluate existing IT processes.<span class=\"moretag\">&#8230;<\/span>","protected":false},"author":246,"featured_media":11669,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"mobile_image_id":0,"tablet_image_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[483,89],"tags":[535,603,602,605,537,604],"class_list":["post-11668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cio-it","category-digital-transformation","tag-cobit","tag-isaca","tag-it-audit","tag-it-frameworks","tag-it-governance","tag-itaf"],"acf":{"__coauthors":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Plan and Use an IT Audit Checklist<\/title>\n<meta name=\"description\" content=\"An IT audit needs to cover many key elements in order to assess existing IT processes. Here, you\u2019ll learn what to include in your IT audit checklist.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.walkme.com\/blog\/it-audit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Plan and Use an IT Audit Checklist\" \/>\n<meta property=\"og:description\" content=\"An IT audit needs to cover many key elements in order to assess existing IT processes. Here, you\u2019ll learn what to include in your IT audit checklist.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.walkme.com\/blog\/it-audit\/\" \/>\n<meta property=\"og:site_name\" content=\"WalkMe Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-07T03:50:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-08T07:59:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"WalkMe Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WalkMe Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.walkme.com\/blog\/it-audit\/\",\"url\":\"https:\/\/www.walkme.com\/blog\/it-audit\/\",\"name\":\"How to Plan and Use an IT Audit Checklist\",\"isPartOf\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/it-audit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/it-audit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png\",\"datePublished\":\"2021-06-07T03:50:00+00:00\",\"dateModified\":\"2023-05-08T07:59:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31\"},\"description\":\"An IT audit needs to cover many key elements in order to assess existing IT processes. Here, you\u2019ll learn what to include in your IT audit checklist.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.walkme.com\/blog\/it-audit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.walkme.com\/blog\/it-audit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.walkme.com\/blog\/it-audit\/#primaryimage\",\"url\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png\",\"contentUrl\":\"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png\",\"width\":1200,\"height\":650},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.walkme.com\/blog\/it-audit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.walkme.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CIO &amp; IT\",\"item\":\"https:\/\/www.walkme.com\/blog\/category\/cio-it\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Plan and Use an IT Audit Checklist\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#website\",\"url\":\"https:\/\/www.walkme.com\/blog\/\",\"name\":\"WalkMe Blog\",\"description\":\"Digital adoption &amp; Change Management Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.walkme.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31\",\"name\":\"WalkMe Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g\",\"caption\":\"WalkMe Team\"},\"description\":\"WalkMe pioneered the Digital Adoption Platform (DAP) for organizations to utilize the full potential of their digital assets. Using artificial intelligence, machine learning and contextual guidance, WalkMe adds a dynamic user interface layer to raise the digital literacy of all users.\",\"url\":\"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Plan and Use an IT Audit Checklist","description":"An IT audit needs to cover many key elements in order to assess existing IT processes. Here, you\u2019ll learn what to include in your IT audit checklist.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.walkme.com\/blog\/it-audit\/","og_locale":"en_US","og_type":"article","og_title":"How to Plan and Use an IT Audit Checklist","og_description":"An IT audit needs to cover many key elements in order to assess existing IT processes. Here, you\u2019ll learn what to include in your IT audit checklist.","og_url":"https:\/\/www.walkme.com\/blog\/it-audit\/","og_site_name":"WalkMe Blog","article_published_time":"2021-06-07T03:50:00+00:00","article_modified_time":"2023-05-08T07:59:48+00:00","og_image":[{"width":1200,"height":650,"url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","type":"image\/png"}],"author":"WalkMe Team","twitter_card":"summary_large_image","twitter_image":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","twitter_misc":{"Written by":"WalkMe Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.walkme.com\/blog\/it-audit\/","url":"https:\/\/www.walkme.com\/blog\/it-audit\/","name":"How to Plan and Use an IT Audit Checklist","isPartOf":{"@id":"https:\/\/www.walkme.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.walkme.com\/blog\/it-audit\/#primaryimage"},"image":{"@id":"https:\/\/www.walkme.com\/blog\/it-audit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","datePublished":"2021-06-07T03:50:00+00:00","dateModified":"2023-05-08T07:59:48+00:00","author":{"@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31"},"description":"An IT audit needs to cover many key elements in order to assess existing IT processes. Here, you\u2019ll learn what to include in your IT audit checklist.","breadcrumb":{"@id":"https:\/\/www.walkme.com\/blog\/it-audit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.walkme.com\/blog\/it-audit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.walkme.com\/blog\/it-audit\/#primaryimage","url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","contentUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","width":1200,"height":650},{"@type":"BreadcrumbList","@id":"https:\/\/www.walkme.com\/blog\/it-audit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.walkme.com\/blog\/"},{"@type":"ListItem","position":2,"name":"CIO &amp; IT","item":"https:\/\/www.walkme.com\/blog\/category\/cio-it\/"},{"@type":"ListItem","position":3,"name":"How to Plan and Use an IT Audit Checklist"}]},{"@type":"WebSite","@id":"https:\/\/www.walkme.com\/blog\/#website","url":"https:\/\/www.walkme.com\/blog\/","name":"WalkMe Blog","description":"Digital adoption &amp; Change Management Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.walkme.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/b6803cf6ff5d66cf789ea833bbddfa31","name":"WalkMe Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.walkme.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d15d25a7d13fc1ba31b0187a32b2f27936e975e166da929698db9971a322a63d?s=96&d=monsterid&r=g","caption":"WalkMe Team"},"description":"WalkMe pioneered the Digital Adoption Platform (DAP) for organizations to utilize the full potential of their digital assets. Using artificial intelligence, machine learning and contextual guidance, WalkMe adds a dynamic user interface layer to raise the digital literacy of all users.","url":"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/walkme.com\/blog\/it-audit\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"How to Plan and Use an IT Audit Checklist","url":"http:\/\/www.walkme.com\/blog\/it-audit\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/www.walkme.com\/blog\/it-audit\/"},"thumbnailUrl":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","image":{"@type":"ImageObject","url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png"},"articleSection":"CIO &amp; IT","author":[{"@type":"Person","name":"WalkMe Team"}],"creator":["WalkMe Team"],"publisher":{"@type":"Organization","name":"WalkMe Blog","logo":""},"keywords":["cobit","isaca","it audit","it frameworks","it governance","itaf"],"dateCreated":"2021-06-07T03:50:00Z","datePublished":"2021-06-07T03:50:00Z","dateModified":"2023-05-08T07:59:48Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"How to Plan and Use an IT Audit Checklist\",\"url\":\"http:\\\/\\\/www.walkme.com\\\/blog\\\/it-audit\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/www.walkme.com\\\/blog\\\/it-audit\\\/\"},\"thumbnailUrl\":\"https:\\\/\\\/www.walkme.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/06\\\/shutterstock_473489821-1.png\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.walkme.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2021\\\/06\\\/shutterstock_473489821-1.png\"},\"articleSection\":\"CIO &amp; IT\",\"author\":[{\"@type\":\"Person\",\"name\":\"WalkMe Team\"}],\"creator\":[\"WalkMe Team\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"WalkMe Blog\",\"logo\":\"\"},\"keywords\":[\"cobit\",\"isaca\",\"it audit\",\"it frameworks\",\"it governance\",\"itaf\"],\"dateCreated\":\"2021-06-07T03:50:00Z\",\"datePublished\":\"2021-06-07T03:50:00Z\",\"dateModified\":\"2023-05-08T07:59:48Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/walkme.com\/p.js"},"lang":"en","translations":{"en":11668},"jetpack_featured_media_url":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","featured_image_src":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","featured_image_src_square":"https:\/\/www.walkme.com\/blog\/wp-content\/uploads\/sites\/2\/2021\/06\/shutterstock_473489821-1.png","author_info":{"display_name":"WalkMe Team","author_link":"https:\/\/www.walkme.com\/blog\/author\/walkme-team\/"},"jetpack_sharing_enabled":true,"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts\/11668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/users\/246"}],"replies":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/comments?post=11668"}],"version-history":[{"count":0,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/posts\/11668\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/media\/11669"}],"wp:attachment":[{"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/media?parent=11668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/categories?post=11668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.walkme.com\/blog\/wp-json\/wp\/v2\/tags?post=11668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}