Audit
Independent end-to-end audits covering the creation, distribution, changes, back-up and storage of cryptographic key material through to its end of life and destruction is undertaken and any required adjustments are made through corrective actions or improvement plans
Showing all 7 results
-
Assessment of IT Application Controls
$50.00 Add to cart -
Basic Assessment of IT Application Management
$50.00 Add to cart -
Digital Security Controls Checklist
$75.00 Add to cart -
ICT General Controls Assessment
$75.00 Add to cart -
ICT Needs and Prioritisation Assessment
$50.00 Add to cart -
Information Technology Governance Capability Maturity Model
$50.00 Add to cart -
Risk Assessment for IT System Implementation
$50.00 Add to cart
Showing all 7 results