PROJECT STATUS: ON HOLDIf you would like to see work continue on this topic, please vote.
Perform Security Audits & Assessments
Validate the enterprise's security stance through internal and external auditing.
Send a friend or colleague a link to this article
Last Revised: May 30, 2010
RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
- The organization needs to validate its security stance for either personal or regulatory reasons.
- Many different types of tests are available from a variety sources. Knowing which tests to select and how to perform them can sometimes be confusing.
- This solution set will help the enterprise understand the difference between the various types of tests, how to select a provider, and how to get usable results from an analysis.
- Enterprises invest considerable time, money, and effort to provide an appropriate security capability; however, without proper testing, the effectiveness of the security investment cannot be determined.
- A number of different testing types exist, which provide various insights into the overall security stance of the enterprise.
- Organizations need to build a comprehensive testing program that serves the dual role of proving security and discovering shortfalls.
It only takes one security stumble to wipe out PC usability for the entire employee base. Use this comprehensive security audit for desktops to assess and address security holes without paying for an overpriced consultant or a costly vendor solution.
Security assessments are focused on determining if information system security controls are correctly implemented, operating as intended, and are producing the desired level of security. Without Security assessments, the potential exists for information systems to not be as secure as intended or desired.