Summary
This chapter covered the process of collecting security data during a security assessment. Planning your assessment and getting the right data is key, as well as ensuring that your organization follows security processes and that they’re verified and validated. This planning should be done systematically with the full involvement of management. The important parts of this assessment include ensuring that the right people have the right accounts with the right permissions, as well as checking for any accounts that are orphaned or not in use. Also important is checking that training is effective, with gamification such as phishing attacks, as well as ensuring that backups are done properly. Key performance and risk indicators provide a way to ensure that we’re properly following our audit plan.
KPIs are also important in disaster recovery and business continuity, giving data on an organization’s and department’s tolerance for downtime and data loss...