Remove Active Monitoring Remove Authentication Remove Outsourcing
article thumbnail

Cybersecurity Audit Checklist

Reciprocity

Confidentiality: Sensitive information isn’t accessible to unauthorized users, usually via encryption such as multi-factor authentication. You may also decide that you want to outsource your security checks. The components of the CIA Model are Confidentiality, Integrity, and Availability.

Audit 52