Key Service Activities
Rudra LLC IT security audit services include reviews of:
- Authentication and access controls
- Network security
- Host security
- User equipment security (e.g.: workstation, laptop, handheld)
- Personnel security
- Physical security
- Application security
- Software development and acquisition
- Business continuity – security
- Service provider oversight – security
- Encryption
- Data security
- Security monitoring
Documentation includes the policies, procedures, and checklists that define and/or support IT controls. The interviews and walk-through, which are conducted with key personnel from the organization, are performed to validate adherence to the documented policies and procedures, as well as to corroborate the practices described during the interview process.
Audit Results
IT security audit results are provided in an extensive report containing:
- Introduction
- Executive summary
- Remediation action plan
- Detailed audit results
- Control descriptions and verification procedures
- Supporting documentation
Options
On-premise and browser-based software that enables the transition to an internally managed information security audit program.