Questions tagged [audit]

For questions about the assessment of software, hardware, systems, people, processes, procedures, projects, etc, that are somehow related to the security of an organization or product. Often these are related to a certification the organization or product holds, or looking for tools or processes for performing an audit.

456 questions
9
votes
10 answers

Why is privacy not one of the pillars of information security?

We have the three pillars: confidentiality, integrity and availability. Why is privacy not one of the three pillars?
PlayMa256
  • 279
  • 2
  • 5
9
votes
2 answers

Breaching a computer knowing only IP when all ports closed - possible?

I'm checking my setup for security holes with some dedicated Linux distros. First thing I did was to scan all ports, and beyond that - it seems like it's pretty much unhackable. Since all ports were closed, I feel safe, but I wonder - am I…
Jack
  • 421
  • 2
  • 4
  • 10
7
votes
2 answers

Did KeePassX ever have an audit funding?

Did KeePassX ever had an Audit Funding like ex.: TrueCrypt? Or any other password manager?
6
votes
1 answer

What are the resources that an auditor would need to access in read mode?

Here a more concrete question: I am interested in documentation for an External Security Audit for ERP applications. What are the types of External Security Audit for ERP applications? What types of resources should be provided in read access only…
Phoenician-Eagle
  • 2,237
  • 17
  • 21
6
votes
1 answer

RKHunter and CHKRootkit Warns About /usr/lib/pymodules/python2.7/.path

In relation to my previous question. I have this Warning again from both RKHunter and Chkrootkit. My VPS has been turned off for how many weeks, until I turned it on again to deploy my website. After the deployment, I did the RKhunter Scan and…
GaryP
  • 173
  • 6
3
votes
2 answers

Password capturing from dump file or browser after log out

I am working on web application security auditing. I was going through various checklists & methodology. I found one interesting stuff in a document. Type - Configuration Management Security Testing - After logout, I created a dump file of my chrome…
FrOgY
  • 329
  • 1
  • 11
3
votes
1 answer

What are the basic points to check during a systems audit?

I work in the petroleum industry and I am 'the young geek'. As such, I am often tasked with writing VBA macros, a bit of JS for data visualization and so on. Lately, I have been assigned the task of 'conducting systems audits'. A few words of…
Peter
  • 138
  • 3
3
votes
2 answers

Security Configuration Audit - CIS benchmarks

I'm trying to conduct a comparative study between the standards used to conduct a security configuration audit. I only found CIS benchmarks. If you could suggest some more known standards it would be helpful.
3
votes
5 answers

How can I easily determine if a website security company is reputable?

Is there a BBB-type listing or some other reputable badge I should look for when choosing someone to perform a security review?
Micah Bolen
  • 133
  • 4
3
votes
2 answers

Where do I start to learn more about a given company's or software solutions' security track record?

I don't personally have the resources or authority to audit for security issues all of the third-party services and companies I might want to use or be forced to use by business circumstances. How then can I learn more about their security track…
2
votes
2 answers

Auditing Event Logs of a System

Soon I will be acquiring the event logs of the systems my company produces and expected to audit them. Multiple logs are generated from each computer and there are multiple operating systems to audit. The systems are isolated from the internet and…
Savvly
  • 23
  • 4
2
votes
2 answers

Printer Job Auditing

Is there a way to audit the actual contents of print jobs sent to a Windows 2008 / Windows 2012 print server? I'm not interested in the metadata (pages, username, datatime etc), but the job itself - as in the data that was printed. I can't find…
ben
  • 123
  • 3
2
votes
4 answers

Is it safer to trust software/company that has been hacked in the past?

Which is better, when you have choices between 2 competing products: First one, which has never been publicly reported about being hacked or having security holes or Second one, which has had bad days in the past, and was hacked (critical…
T.Todua
  • 2,727
  • 4
  • 21
  • 30
2
votes
1 answer

SOC 2 audit for small business (6 employees) with no IT department

One of our clients is demanding that we complete a SOC 2 Type II audit. There is no way we will meet the standard, and, considering we only handle publicly available data, it is ridiculous that they are asking for one. We're talking about 6-8 Excel…
2
votes
1 answer

Information Security Audit - Employment Contract

As part of a a security audit, a customer has asked for some documentation - usual stuff - data classification policy, incident management policy etc. They have also asked for a blank employment contract. I don't see what use this could really be to…
iainpb
  • 4,172
  • 2
  • 18
  • 35
1
2 3 4