Here a more concrete question:
I am interested in documentation for an External Security Audit for ERP applications.
- What are the types of External Security Audit for ERP applications?
- What types of resources should be provided in read access only for External Auditors examining ERP applications?