Description
Assessment designed to determine the differences between the present state of information security within an enterprise and its ideal, or optimum, state.
Scope
Phase 1
• Administrative controls validation
• Data & information Security Controls
• Configuration Controls
|• Validation
Deliverables
Technical report with checklist for controls implement vaidation, requirement for the missing control and impact.
Reviews
There are no reviews yet.