Assessment designed to determine the differences between the present state of information security within an enterprise and its ideal, or optimum, state.
• Administrative controls validation
• Data & information Security Controls
• Configuration Controls
Technical report with checklist for controls implement vaidation, requirement for the missing control and impact.