O'Reilly logo

IT Auditing: Using Controls to Protect Information Assets by Kevin Wheeler, Mike Schiller, Chris Davis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 10Auditing Storage

This chapter covers auditing storage and begins with an overview of common storage technologies. The storage audit combines the concerns of the platform and the data. The platform has similar control requirements as those found in a server. The data has unique control requirements because of the necessity to keep appropriate controls in place for different classes of data. This chapter covers the following:

• A brief technical overview of storage

• How to audit the storage environment

• Tools and resources for enhancing your storage audits

Background

Storage extends the boundaries of the computing environment to allow data to be shared among users and applications. Storage platforms have grown so efficient that servers ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required