O'Reilly logo

Windows Server 2003 Security: A Technical Reference by Roberta Bragg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Auditing Security Controls: Policy Compliance, Vulnerability Assessment, and Pen Testing

Determining security policy and implementing the technical controls that support it is not a trivial task. Keeping controls in place is harder. There are many reasons for this:

  • Security policy can change. Although this is not usually a rapid process, when a change is made, it can mean that a lot of configuration changes or procedural changes are needed. Security policy changes can result from legislative changes, internal or external audits, a better understanding of the technology or the risks inherent in its use for a specific purpose, or even management's acceptance of a proposed change from you.

  • Required changes to operating systems and applications (patches ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required