It Auditing: Using Controls to Protect Information Assets [IT AUDITING -OS N/D]
Additional considerations might exist for your environment depending on your size, your geographic reach, and what kind of data exist on your network. Some of these additional considerations might include
-
License management for software tracked by the number of users.
-
Verify that processes exist for international support for diverse or geographically scattered organizations.
-
Categorize the types of data typically stored on corporately managed mobile devices and the level of protection typically required in accordance with your information classification policy.
-
Evaluate the switching and routing infrastructure as it relates to these components.