As it stands many think that security starts with solid policies and
procedures. Every good policy and procedure will have a scope. I am in the
midst of taking an organization and applying some best practices with some
audit requirements. How do you scope a project that is based on best
practices and encompasses everything from servers, routers, switches,
firewalls, and unused network drops?
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to