IT Examiner School, Providence, RI

Privileged/Admin Access

• “Skeleton Key”- all access key • Access to key functions such as add, delete, and change. • Control over employee rights and permissible activities. • Access to key controls such as auditing, logging, etc. that would record a cyber event • Permit “root” access which allows them to change operating system controls.

VOIP

• Physical / Logical controls • Patch management/ operating system updates • Network segmentation • Security testing

Made with FlippingBook Annual report