4. Feedback
This chapter presents case studies of security audits and their implementation in an operational context.
4.1 Implementation of the "audit" phase in project management
When it comes to integrating security precepts into a project cycle (whether development- or product-oriented), checkpoints need to be set up throughout the various project phases. The security audit (e.g., technical) is just one phase in this cycle.
As budgets (resources) for security aspects are not infinite, it is a good idea to carry out an initial project triage phase, the role of which is to identify the criticality of the project in question. This triage phase can be carried out rapidly, using a set of predefined questions to identify the need (or not) for close...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Feedback
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Works
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!