Enterprise IT managers need not dread third party security audits, say researchers with security firm SANS.
The company on Monday issued a short list of tips to help IT departments get through audits with minimal headaches.
Among the tips provided by SANS handler Mari Nichols were not to panic prior to an audit, but also be prepared and have possible questions answered in advance. Nichols also recommended that administrators keep copies of security training materials and IT security policies handy.
Other tips included paying careful attention to logging and keeping an untouched workstation on hand for the auditors to browse.
Most importantly, however, was maintaining the right attitude. Nichols said that IT departments should approach audits not as a dreaded chore, but as a learning experience and chance to beef up security protections.
"Playing these situations to your fullest abilities will not only increase the profitability of your business, it will also result in a tightened down security posture for your company," she wrote.
"This may be the straw that increases security in your environment. You may even get your pet project going again after frustrating funding delays."
SANS offers tips for IT audit survival
By
Shaun Nichols
on Aug 18, 2009 2:02PM

Got a news tip for our journalists? Share it with us anonymously here.
Partner Content

Kaseya Dattocon APAC 2024 is Back

How NinjaOne Is Supporting The Channel As It Builds An Innovative Global Partner Program

Build cybersecurity capability with award winning Fortinet training from Ingram Micro

Secure, integrated platforms enable MSPs to focus bringing powerful solutions to customers

Tech For Good program gives purpose and strong business outcomes
Sponsored Whitepapers
-1.jpg&w=100&c=1&s=0)
Stop Fraud Before It Starts: A Must-Read Guide for Safer Customer Communications

The Cybersecurity Playbook for Partners in Asia Pacific and Japan

Pulseway Essential Eight Framework

7 Best Practices For Implementing Human Risk Management

2025 State of Machine Identity Security Report