Chapter 18. Starting Your Onsite Efforts
Introduction
This chapter discusses the framework of the onsite evaluation phase, where the meat of the technical evaluations occurs. This also means that the majority of surprises are likely to occur during this phase, so flexibility is paramount. One of the objectives of the INFOSEC Evaluation Methodology (IEM) is to verify information regarding systems and controls documented during the INFOSEC Assessment Methodology (IAM). All technical controls are meant to support policy defined by the ...
Get The Best Damn IT Security Management Book Period now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.