Infrastructure Data Leakage Prevention system, rules and reports Privileged Account Management process Network Access and exception handling Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting and remediation On an ad hoc bases the consultant Firewall rule configuration and report The consultant will be required to report on the status of the cyber Auditing Risk management Incident Investigation Reporting and Administration Security tools monitoring
Infrastructure Data Leakage Prevention system, rules and reports Privileged Account Management process Network Access and exception handling Vulnerability Scanning, reporting, proposing remediation actions and tracking compliance Security hardening baseline compliance scanning, reporting and remediation On an ad hoc bases the consultant Firewall rule configuration and report The consultant will be required to report on the status of the cyber Auditing Risk management Incident Investigation Reporting and Administration Security tools monitoring
Understanding and how to interpret GRC SOD violation reports. Updating of roles/users and understanding risk Role based permissions, Proxy access restrictions, report access Knowledge of Control and Compliance requirements
solution to analyse its own faults and provide reports prior to a critical failure. Develop the solution