Many security firms often provide audit assurance to their clients. As a part of their many activities, auditing corporate email system is one of their principal activity. In this article, I have 40 guidelines which an auditor or manager can use to audit their clients' corporate email system. It includes some technical and more procedural guidelines.
Everything about threat intelligence, blue team, red team, pentesting, security audit, security review, testing and assessment.
Sunday, November 24, 2019
Auditing remote access process and procedures
In this article, I am going to share a small checklist that will help auditors and testers to provide assurance on remote access processes and procedures for any company. This is not a technical article but controls defined in this list can be well-reviewed by managers and to be discussed with clients. For each part, if they want to go in-depth, they can.
Subscribe to:
Posts (Atom)