To conduct a review of IT general / process controls (e.g., Change Management, User Access, IT Continuity, IT Security Management, IT Operations, etc.) and specific application controls, including IT-related security parameter settings over various IT components (e.g., OS, database, network).