[2 days left] What’s wrong with your cloud strategy? Learn why multicloud solutions matter with Nimble Storage.Register Now

x
?
Solved

ops & security audit

Posted on 2011-09-16
4
Medium Priority
?
418 Views
Last Modified: 2012-05-12
We have some local primary schools and libraries who want (with little budget) some guidance on what a top level IT audit / operations audit should look at and include. They have very little budget and could probably get a partner specialist to spend a day / day and a half to allow someone to review there network from security and operations best practice. Can you provide say “10 areas” that would be priority in a small setup that should be reviewed, which would take priority so they know they are getting the right areas reviewed for what budget they have?
0
Comment
Question by:pma111
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
4 Comments
 
LVL 19

Accepted Solution

by:
CoccoBill earned 2000 total points
ID: 36553379
From top of my head:

- security policy and others, e.g. acceptable use policies
- patch management
- backup and restore
- change management
- logging and monitoring
- configuration management (servers, workstations, switches/routers and firewalls)
- hardware and software inventory, license management
- incident management
- account management

1-1.5 work days is not a lot to cover those and do the reporting, but it should be possible to at least quickly go through all of the areas in an interview workshop and find any major issues.
0
 
LVL 3

Author Comment

by:pma111
ID: 36556530
Thanks for the input

would security policy include the technical AD security domain policy?

And how would they audit incident management at a technical level?

Thanks
0
 
LVL 19

Expert Comment

by:CoccoBill
ID: 36556549
By security policy I meant the policy documents that state the goals, responsibilities, roles, standards, guidance etc for security management within your organization. AD domain policy (password policies etc) would rather fall under account management I guess. None of the areas require a technical assessment and for some like incident management they're not really even possible. Reviewing of any existing documentation/guidance/processes and interview workshops should be the easiest way to go about this.
0
 
LVL 3

Author Comment

by:pma111
ID: 36556560
Ok many thanks for your assistance
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
It’s time for spooky stories and consuming way too much sugar, including the many treats we’ve whipped for you in the world of tech. Check it out!
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

656 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question