ABSTRACT

Security Framework ..................................................................................144 Control Categories ........................................................................146 Summary ......................................................................................147

Compliance Techniques ............................................................................148 Observations .................................................................................148 Testing ..........................................................................................149 Penetration Testing ........................................................................149 Social Engineering.........................................................................149 Logging .........................................................................................150