Designing and Conducting Security Testing
In the previous chapter, you gained an understanding of different security control testing models, such as vulnerability assessments and penetration testing. In this chapter, you will explore security audits in depth – specifically, how to conduct audits and analyze the output.
An important part of security assessment and testing is collecting technical and administrative data to make sure that our systems are secure. With regular reviews and testing of systems and processes, gaps in knowledge and practices can be found and remediated. The data collecting process during such reviews includes checking that identity management and access control are being implemented correctly, reviewing training and awareness programs for scope and effectiveness, and ensuring that backup data is properly collected and stored in the event of a disaster.
This chapter covers disaster recovery, disaster recovery planning, and business continuity. You...