From the course: Performing a Technical Security Audit and Assessment
What are technical security assessments?
From the course: Performing a Technical Security Audit and Assessment
What are technical security assessments?
- The purpose of technical security assessments is to evaluate the security posture of a system, network, or organization. In addition, a successful technical security assessment detects security weaknesses, and offers recommendations for improving the organization's security. Technical security assessments serve two primary functions: identifying security weaknesses and technical vulnerabilities, and assessing compliance with internal and external security standards, such as PCI, or ISO/IEC 27001. It's important to note that technical security assessment should not be considered a substitute for security measures. These assessment should occur after security controls are implemented to measure the security status. For optimal results, security assessments should be carried out on a regular basis with intervals ranging from quarterly, to semi-annually, or annually. Regular security assessments are part of a well-managed security program. When executed correctly, they will provide valuable insights into your organization's security status. Consistent assessments also enable you to track trends and measure the timely remediation of security gaps. In summary, a well conducted security assessment is pivotal in understanding and improving your organization's security posture.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.