As it stands many think that security starts with solid policies and procedures. Every good policy and procedure will have a scope. I am in the midst of taking an organization and applying some best practices with some audit requirements. How do you scope a project that is based on best practices and encompasses everything from servers, routers, switches, firewalls, and unused network drops?
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
