A routine audit of an organization’s systems for Security Compliance, efficiency and security. Has:

  • Clear objectives
  • Data collection during audit
  • Evaluations against set standards
  • Recommendations
  • Follow-ups Can be used to:
  • Identify inefficiencies
  • Verify compliance
  • Enhance Quality

Steps

Vulnerability Analysis

Assessing:

  • Prioritization
  • Classification
  • Exposure
  • Organizational impact assessment
  • Risk tolerance definition

Confirmation

Determining if threats are: