Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying IT Audit Field Manual
  • Table Of Contents Toc
IT Audit Field Manual

IT Audit Field Manual

By : Lewis Heuermann
5 (2)
close
close
IT Audit Field Manual

IT Audit Field Manual

5 (2)
By: Lewis Heuermann

Overview of this book

As cyber threats evolve and regulations tighten, IT professionals struggle to maintain effective auditing practices and ensure robust cybersecurity across complex systems. Drawing from over a decade of submarine military service and extensive cybersecurity experience, Lewis offers a unique blend of technical expertise and field-tested insights in this comprehensive field manual. Serving as a roadmap for beginners as well as experienced professionals, this manual guides you from foundational concepts and audit planning to in-depth explorations of auditing various IT systems and networks, including Cisco devices, next-generation firewalls, cloud environments, endpoint security, and Linux systems. You’ll develop practical skills in assessing security configurations, conducting risk assessments, and ensuring compliance with privacy regulations. This book also covers data protection, reporting, remediation, advanced auditing techniques, and emerging trends. Complete with insightful guidance on building a successful career in IT auditing, by the end of this book, you’ll be equipped with the tools to navigate the complex landscape of cybersecurity and compliance, bridging the gap between technical expertise and practical application.
Table of Contents (18 chapters)
close
close
Lock Free Chapter
1
Part 1: Foundations of IT Auditing
4
Part 2: Auditing IT Systems and Networks

Cloud Security Auditing

The security of cloud-based assets is a major concern for organizations worldwide. As cloud infrastructures become more complex and necessary for business operations, the role of cloud security auditing emerges as a critical discipline aimed at assessing, validating, and enhancing the security measures deployed in cloud environments.

In this chapter, we will explore the intricacies of auditing in the cloud, highlighting the unique challenges and opportunities presented by cloud computing models. We will focus on two of the major cloud service providers, Microsoft Azure and Amazon Web Services (AWS), to provide a thorough examination of how to navigate and audit their distinct environments effectively. We will look into key audit areas such as governance, network configuration, asset management, access control, and data encryption. We will also discuss the development of audit programs and the use of automation in audit processes. Whether you’re tasked...

CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
IT Audit Field Manual
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon