June 2017
Intermediate to advanced
258 pages
6h 9m
English
Many organizations, especially if they are security conscious, may require any physical equipment that may leave their environment to be physically destroyed. This was most likely talked about during the stakeholder meetings. You, as a responsible penetration tester, need to make sure that this task is followed out to the stakeholders' exact requirement. Chain of custody may be brought up at this point as well.
A chain of custody is a series of documents that show secure possession and secure transfer of any IT hardware in its most simple form. Any time a piece of hardware is taken offsite for destruction, the whole process from point A to point B needs to be fully documented. Some destruction companies will ...
Read now
Unlock full access