In addition to requesting their input on the security design, you can also set up procedures for the auditing staff which allow them to take advantage of the auditing features provided in CA Top Secret. These procedures must be developed early in the security design phase to allow the auditors to monitor activity as the implementation progresses. This is discussed in the “Define Audit Requirements” chapter. Auditors may be able to offer input on design requirements as a result of this review, and this may prove significant in tightening the security procedures developed.
|
Copyright © 2009 CA.
All rights reserved.
|
|