Applies procedures to assess compliance with information security policies and standards. For example, assesses compliance of hardware and software configurations to policies, standards, and legal and regulatory requirements.
Applies procedures to assess compliance with information security policies and standards. For example, assesses compliance of hardware and software configurations to policies, standards, and legal and regulatory requirements.