From the course: Performing a Technical Security Audit and Assessment
Unlock the full course today
Join today to access over 24,800 courses taught by industry experts.
Conduct documentation reviews
From the course: Performing a Technical Security Audit and Assessment
Conduct documentation reviews
- [Narrator] The purpose of documentation reviews is to determine if security documents are current, accurate, and complete. Although this step in the security assessment process may not be as captivating as technical testing techniques, it's fundamentally important. Security documentation is the foundation of a good security program. Poorly written documentation or missing documentation could indicate inadequate security controls. When starting a security assessment, one of your first requests should be for all relevant documentation. Delayed delivery of documentation may suggest it's not readily available to IT or security staff who need it the most. The documentation you request may include security policies, standards, processes and procedures, system security plans and configuration instructions, network architectures and diagrams, incident response plans, and evidence of third party testing or certifications. Assessors can measure an organization's documentation, compliance with…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
Baseline skill sets for security reviews2m 21s
-
(Locked)
Conduct documentation reviews1m 58s
-
(Locked)
Conduct log reviews2m 8s
-
(Locked)
Conduct ruleset reviews2m 18s
-
(Locked)
Conduct system configuration reviews2m 51s
-
(Locked)
Conduct network sniffing1m 19s
-
(Locked)
Network sniffing tool demo: Wireshark2m 16s
-
(Locked)
Conduct file integrity checking2m 39s
-
File integrity checking tool demo1m 21s
-
(Locked)
Challenge: Pick the right reviews1m 6s
-
(Locked)
Solution: Pick the right reviews2m 37s
-
-
-
-
-
-
-