Find Resources & Connect with members on topics that interest you.

AI - Acquire and Implement

PO - Plan and Organize

DS - Deliver and Support

Please sign in to see your topics.

You must be logged in to join this group.

PO10.10 - Project Quality Plan

This topic is intended to enable collaboration and sharing of information to facilitate a better understanding and approach to implementing this COBIT control objective based on the risk, value and guidance provided by its corresponding control practices.

COBIT Control Objective PO10.10 - Project Quality Plan is contained within Process Popup Manage Projects.

Learn more about COBIT and related publications.

Click “Join This Community” to be able to actively participate in discussions and contribute content. You must be an ISACA member to join this topic. Join ISACA now.

 
This Topic Has:
4 Members
0 Online
3842 Visits

 Recent Discussions

Community Leader

Knowledge Center Manager

Knowledge Center Manager

Title: Become a Topic Leader!

Badge: Energizer


Project Quality Plan

Prepare a quality management plan that describes the project quality system and how it will be implemented. The plan should be formally reviewed and agreed to by all parties concerned and then incorporated into the integrated project plan.

View value and Risk Drivers  help

Hide value and Risk Drivers help


Value Drivers

  • Alignment of the project quality plan with the corporate quality framework
  • Increased likelihood of the implemented system or system modification meeting business and user requirements
  • A consistent level of quality assurance activity across the project, including third parties
  Risk Drivers
  • Project deliverables failing to meet business and user requirements
  • Gaps in expected and delivered quality within the projects
  • Inefficient and fragmented approach to quality assurance
  • Implemented system or changes adversely impact existing systems and infrastructure

View Control Practices  help

Hide Control Practices  help

  1. Identify ownership and responsibilities, quality review processes, success criteria and performance metrics, to provide quality assurance for the project deliverables.
  2. Define any requirements for independent validation and verification of the quality of deliverables in the plan.

Discussions: 0 total

Must be a Topic member to contribute

No Results Found

Documents & Publications: 110 total

Must be a Topic member to contribute
View All »
Downloads
Posted by ISACA 816 days ago
Books
Posted by ISACA 39 days ago
Books
Posted by ISACA 109 days ago
Books
Posted by ISACA 155 days ago
Books
Posted by ISACA 214 days ago

Events & Online Learning: 13 total

Journal Articles: 169 total

Volume 3, 2016
by Joseph Zipper, CISA, IPRC, PMP
Efficient and effective auditing of major projects requires a flexible approach, where audit is actively engaged throughout the project life cycle.
Volume 3, 2016
by Ed Gelbstein, Ph.D.
Every topic can be subdivided into many more sections, but the intention of this column is not to provide a detailed manual (it would be a large book), just an overview.
Volume 3, 2016
by Angel Serrano, CISA, CISM, CRISC
There are many different definitions of the term ‘big data’, and concerns about whether it will necessitate significant changes in business operations in the short term.
Volume 3, 2016
by Samuel Shanthan, CISA, CIPM, MBCI
It is of paramount importance to ensure the continuity of vendors, especially those that are providing and supporting the critical services and processes of the organisation.
Volume 3, 2016
by Simon Grima, Ph.D., Robert W. Klein, Ph.D., Ronald Zhao, Ph.D., Frank Bezzina, Ph.D. and Pascal Lélé, Ph.D.
What are the specific risk and opportunities that affect the ability of the organization to create value in the short, medium and long term? How will the organization capitalize on these to obtain a competitive advantage?
Volume 3, 2016
by Stefano Ferroni, CISM, ISO 27001 LA, ITIL Expert
The importance of SoD arises from the consideration that giving a single individual complete control of a process or an asset can expose an organization to risk.

Wikis: 2 total

Blog Posts: 98 total

One of the things that security-minded professionals need to employ is the "trust, but verify" mantra as a part of our daily practices. This is especially true for cloud-hosted applications. During a recent audit of cloud hosted solutions, a very simp...
Posted By : Gary055 | 0 comments
And so to begin. Let's look at taxonomy. The names and definitions of things that will guide us in our time together. Since this is a blog about Privacy, lets start the definitions there. According to Merriam-Webster, Privacy is a noun that means "The ...
Posted By : HPMahan | 0 comments
A Potemkin Village is a term used to describe situations where a thinly veiled facade is created with no underlying substance. Legend has it that Grigory Potemkin became Governor of Southern Ukraine and Crimea after the Russian takeover in 1774. Potemkin...
Posted By : Joseph496 | 0 comments
When you are standing in front of the mirror preparing for the day, how many people think to themselves "I will do everything I can to save the company 57 cents including putting customer’s lives at risk." Or how about "I will lie to, deceive, and obstruc...
Posted By : Joseph496 | 0 comments
1. Objective and Convergence of BYOD According to PCWorld definition; BYOD —also called bring your own technology (BYOT), bring your own phone (BYOP), and bring your own PC (BYOPC)—refers to the policy of permitting employees to bring personally owned mo...
Posted By : Navid Baradaran | 0 comments
Disclaimer: This only represent my experience Views and opinion Introduction Information Security Manager’s oversee information security programs which includes network security in organisations or business enterprises. With documented knowledge ab...
Posted By : Prince143 | 0 comments