Auditing New/Other Technologies

In this chapter we will discuss basic steps you can use to assist you in performing audits of technologies that are not covered elsewhere in this book. The steps will be divided into the following areas:

•   Initial steps

•   Account management

•   Permissions management

•   Network security and controls

•   Security monitoring and other general controls


While we wish this book could cover every possible technology you might encounter during your audits, such a book would be too long to read, too heavy to lift, and too expensive to purchase. We have attempted to cover some of the more common technologies in detail; however, there are a plethora of technologies out there (with new ones being ...

Get IT Auditing Using Controls to Protect Information Assets, Third Edition, 3rd Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.