CHAPTER 18
Auditing New/Other Technologies
In this chapter we will discuss basic steps you can use to assist you in performing audits of technologies that are not covered elsewhere in this book. The steps will be divided into the following areas:
• Initial steps
• Account management
• Permissions management
• Network security and controls
• Security monitoring and other general controls
Background
While we wish this book could cover every possible technology you might encounter during your audits, such a book would be too long to read, too heavy to lift, and too expensive to purchase. We have attempted to cover some of the more common technologies in detail; however, there are a plethora of technologies out there (with new ones being ...
Get IT Auditing Using Controls to Protect Information Assets, Third Edition, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.