User Tools

Site Tools


policies:security:audit

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
policies:security:audit [2018/01/05 14:58] – [41. Penetration testing] deulpolicies:security:audit [2018/01/10 12:19] (current) – [40. IT Audit] deul
Line 5: Line 5:
 On a regular basis security checks are performed using standard web tools such as [[https://www.ssllabs.com/|Qualys SSL Labs]]. In addition the yearly OS upgrade of all Desktops initiates a similar audit on the local machine base and ensures clean secure installes of all such devices. On a regular basis security checks are performed using standard web tools such as [[https://www.ssllabs.com/|Qualys SSL Labs]]. In addition the yearly OS upgrade of all Desktops initiates a similar audit on the local machine base and ensures clean secure installes of all such devices.
  
-Upon response to a worldwide security incident, whenever that has an impact on the IT Department managed system, will sprout a security audit of those devices vulnerable to the incident.+Upon response to a worldwide security incident, whenever that has an impact on the IT Department managed systems, will sprout a security audit of those devices vulnerable to the incident.
  
 ====41. Penetration testing==== ====41. Penetration testing====
 This is not done on a regular or controlled manner, however, each year students find it interesting to perform such attempts at will. This is not done on a regular or controlled manner, however, each year students find it interesting to perform such attempts at will.
policies/security/audit.1515164284.txt.gz · Last modified: by deul