Skip to Main Content
IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition
book

IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

by Chris Davis, Mike Schiller, Kevin Wheeler
February 2011
Intermediate to advanced content levelIntermediate to advanced
512 pages
15h 37m
English
McGraw-Hill
Content preview from IT Auditing Using Controls to Protect Information Assets, 2nd Edition, 2nd Edition

CHAPTER 10Auditing Storage

This chapter covers auditing storage and begins with an overview of common storage technologies. The storage audit combines the concerns of the platform and the data. The platform has similar control requirements as those found in a server. The data has unique control requirements because of the necessity to keep appropriate controls in place for different classes of data. This chapter covers the following:

• A brief technical overview of storage

• How to audit the storage environment

• Tools and resources for enhancing your storage audits

Background

Storage extends the boundaries of the computing environment to allow data to be shared among users and applications. Storage platforms have grown so efficient that servers ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Legal and Privacy Issues in Information Security, 3rd Edition

Legal and Privacy Issues in Information Security, 3rd Edition

Joanna Lyn Grama
Auditing IT Infrastructures for Compliance, 3rd Edition

Auditing IT Infrastructures for Compliance, 3rd Edition

Robert Johnson, Marty Weiss, Michael G. Solomon

Publisher Resources

ISBN: 9780071742382