A routine audit of an organizationās systems for Security Compliance, efficiency and security. Has:
- Clear objectives
- Data collection during audit
- Evaluations against set standards
- Recommendations
- Follow-ups Can be used to:
- Identify inefficiencies
- Verify compliance
- Enhance Quality
Steps
Vulnerability Analysis
Assessing:
- Prioritization
- Classification
- Exposure
- Organizational impact assessment
- Risk tolerance definition
Confirmation
Determining if threats are: