version_locking_legacy_environments
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revisionNext revisionBoth sides next revision | ||
version_locking_legacy_environments [2019/01/23 22:39] – [Auditing Tools] sgriggs | version_locking_legacy_environments [2019/01/23 22:40] – [Auditing Standards] sgriggs | ||
---|---|---|---|
Line 134: | Line 134: | ||
So, for each vulnerability that you've determined is potentially valid put on your auditor hat and ask several questions. | So, for each vulnerability that you've determined is potentially valid put on your auditor hat and ask several questions. | ||
- | Audit Questions about Vulnerabilities | + | __Audit |
* Do you have a policy about vulnerabilities? | * Do you have a policy about vulnerabilities? | ||
* Do you have a policy about this vulnerability? | * Do you have a policy about this vulnerability? | ||
Line 178: | Line 178: | ||
- | Requirements | + | __Requirements |
* You've got to have an IT security policy. | * You've got to have an IT security policy. |
version_locking_legacy_environments.txt · Last modified: 2019/01/25 21:20 by sgriggs