Chapter 1. Introduction to IT Compliance
Solutions in this chapter:
▪ Does Security Belong within IT?
▪ What are Audits, Assessments, and Reviews?
This book provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This “roadmap” provides a way of interpreting complex, often confusing, compliance requirements within the larger scope of an organization's overall needs.
Data held on IT systems is valuable and critical to the continued success of any organization. We all rely on information systems to store and process information, so it is essential that we maintain ...