{"id":2345,"date":"2020-01-22T13:49:30","date_gmt":"2020-01-22T13:49:30","guid":{"rendered":"https:\/\/corvit.com\/consulting\/?page_id=2345"},"modified":"2020-01-27T11:42:33","modified_gmt":"2020-01-27T11:42:33","slug":"it-audit","status":"publish","type":"page","link":"https:\/\/corvit.com\/consulting\/it-audit\/","title":{"rendered":"IT &#038; Security Audit"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2345\" class=\"elementor elementor-2345\" data-elementor-settings=\"[]\">\n\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-element elementor-element-4160e105 elementor-section-full_width elementor-section-content-top elementor-reverse-tablet elementor-reverse-mobile elementor-section-height-default elementor-section-height-default elementor-section elementor-top-section\" data-id=\"4160e105\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-286d4767 elementor-column elementor-col-100 elementor-top-column\" data-id=\"286d4767\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16da9a71 elementor-widget__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"16da9a71\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p><!-- wp:paragraph --><\/p>\n<p><span style=\"color: #333333;\">IT &amp; Security audit is the examination and evaluation of an organization&#8217;s information technology infrastructure, policies and operations. They determine whether IT &amp; Security controls protect corporate assets, ensure data integrity and are aligned with the business&#8217;s overall goals. IT auditors examine not only physical security controls, but also overall business and financial controls that involve information technology systems.<\/span><\/p>\n<p><span style=\"color: #333333;\">IT &amp; Security audit covers different aspects of PPT (People, Process &amp; Technology), CIA (Confidentiality, Integrity, Availability) and AAA (Authentication, Authorization, Accounting). Auditing information security is a vital part of any IT audit and is often understood to be the primary purpose of an IT Audit. The broad scope of auditing information security includes such topics as data centers (the physical security of data centers and the logical security of databases, servers and network infrastructure components), networks and application security.<\/span><\/p>\n<p><span style=\"color: #333333;\">We follow industry&#8217;s best practices, frameworks and standards like ISO 270001,&nbsp;ISO 20000, ISO 22301, ISO 31000, ISA 99 (IEC 6244), ISO \/ IEC 38500, COBIT, ITIL, TOGAF, HITRUST, NITECH, PCI DSS, HIPPA, NIST, Qcert etc&nbsp;&nbsp;<\/span><\/p>\n<div>&nbsp;<\/div>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p>\n<p><!-- wp:list --><\/p>\n<p><!-- \/wp:list --><\/p>\n<p><!-- wp:paragraph --><\/p>\n<p><!-- \/wp:paragraph --><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-element elementor-element-3288311 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-section elementor-top-section\" data-id=\"3288311\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7f83d3e elementor-column elementor-col-50 elementor-top-column\" data-id=\"7f83d3e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28e3618 elementor-widget elementor-widget-text-editor\" data-id=\"28e3618\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><ol>\n<li><strong><span style=\"color: #800000;\">\u00a0IT Governance Audit<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #800000;\">\u00a0Infosec &amp; Cyber Security Audit<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #800000;\">\u00a0Penetration Testing\u00a0<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #800000;\">\u00a0Vulnerability Assessment<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #800000;\">\u00a0Data Center Audit<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #800000;\">\u00a0Application &amp; Database Audit<\/span><\/strong><\/li>\n<li><strong><span style=\"color: #800000;\">\u00a0Industrial Control System \/ SCADA Security Audit\u00a0<\/span><\/strong><\/li>\n<\/ol><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c224419 elementor-column elementor-col-50 elementor-top-column\" data-id=\"c224419\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap  elementor-element-populated\">\n\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7c9621c elementor-widget elementor-widget-image\" data-id=\"7c9621c\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"2800\" height=\"1883\" src=\"https:\/\/corvit.com\/consulting\/wp-content\/uploads\/2020\/01\/audit-1.jpg\" class=\"attachment-full size-full\" alt=\"\" srcset=\"https:\/\/corvit.com\/consulting\/wp-content\/uploads\/2020\/01\/audit-1.jpg 2800w, https:\/\/corvit.com\/consulting\/wp-content\/uploads\/2020\/01\/audit-1-300x202.jpg 300w, https:\/\/corvit.com\/consulting\/wp-content\/uploads\/2020\/01\/audit-1-768x516.jpg 768w, https:\/\/corvit.com\/consulting\/wp-content\/uploads\/2020\/01\/audit-1-1024x689.jpg 1024w\" sizes=\"(max-width: 2800px) 100vw, 2800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>IT &amp; Security audit is the examination and evaluation of an organization&#8217;s information technology infrastructure, policies and operations. They determine whether IT &amp; Security controls protect corporate assets, ensure data integrity and are aligned with the business&#8217;s overall goals. IT auditors examine not only physical security controls, but also overall business and financial controls that [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/corvit.com\/consulting\/wp-json\/wp\/v2\/pages\/2345"}],"collection":[{"href":"https:\/\/corvit.com\/consulting\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/corvit.com\/consulting\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/corvit.com\/consulting\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/corvit.com\/consulting\/wp-json\/wp\/v2\/comments?post=2345"}],"version-history":[{"count":66,"href":"https:\/\/corvit.com\/consulting\/wp-json\/wp\/v2\/pages\/2345\/revisions"}],"predecessor-version":[{"id":2613,"href":"https:\/\/corvit.com\/consulting\/wp-json\/wp\/v2\/pages\/2345\/revisions\/2613"}],"wp:attachment":[{"href":"https:\/\/corvit.com\/consulting\/wp-json\/wp\/v2\/media?parent=2345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}