is there a common approach to plan security audits? Which ways are most fitting to security and business needs? In which way do I have to take account of the characteristics ?
Thanks a lot, Sebastian
--------------------------------------------------------------------------- ----------------------------------------------------------------------------