On Thu, 9 Jun 2005 12:23:33 -0500, Terry Linsley wrote:

>The organization we service is suffering through an audit at the moment.
>One of the things the auditors looked at was the secure file transfer
>process I had setup for that organization (OpenSSH based).  They explained
>it sufficiently, but the auditor had one last requirement.  She wanted
>proof that the data was actually being encrypted. ????

If you want to make this potentially long story short you really ought to
ask the auditor directly (perhaps in writing) exactly what "proof" she will
accept.

Provide it.

She should be satisfied, you will do what is actually required and all will
otherwise be right with the world.

In my experience trying to do anything else is an exercise in pain.

--
Tom Schmidt
Madison, WI
(All auditor questions are strange at first glance.  Only a few become less
strange over time.  - Schmidt's Law)

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to