From the course: Performing a Technical Security Audit and Assessment

Unlock the full course today

Join today to access over 24,800 courses taught by industry experts.

Solution: Write a security assessment methodology

Solution: Write a security assessment methodology

From the course: Performing a Technical Security Audit and Assessment

Solution: Write a security assessment methodology

- [Narrator] Let's look at the key components of a methodology section in a security assessment plan and how it might be tailored for a specific scenario. This scenario was an external covert test. Your methodology won't look exactly like mine, but it should have at least how the data will be gathered, how the security controls will be tested, and when testing will be conducted. Here's the way I wrote the methodology. While I won't read this to you, I outlined how data gathering procedures are conducted and security controls are tested, and the timing of testing activities. Remember, your methodology doesn't need to match mine exactly, but it should address these essential elements. You can use this example as a guide when writing your own security assessment plan in the future.

Contents