ABSTRACT
Security Framework ..................................................................................144 Control Categories ........................................................................146 Summary ......................................................................................147
Compliance Techniques ............................................................................148 Observations .................................................................................148 Testing ..........................................................................................149 Penetration Testing ........................................................................149 Social Engineering.........................................................................149 Logging .........................................................................................150