{"id":901,"date":"2024-04-11T06:52:25","date_gmt":"2024-04-11T06:52:25","guid":{"rendered":"https:\/\/qtnt.com\/?page_id=901"},"modified":"2024-04-16T11:11:58","modified_gmt":"2024-04-16T11:11:58","slug":"system-audits-of-application-system-security-control","status":"publish","type":"page","link":"https:\/\/qtnt.com\/index.php\/system-audits-of-application-system-security-control\/","title":{"rendered":"System Audits of Application System security &amp; Control"},"content":{"rendered":"\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" class=\"wp-block-cover__image-background wp-image-1053\" alt=\"\" src=\"https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-mikhail-nilov-6963098-1024x683.jpg\" style=\"object-position:44% 38%\" data-object-fit=\"cover\" data-object-position=\"44% 38%\" srcset=\"https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-mikhail-nilov-6963098-1024x683.jpg 1024w, https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-mikhail-nilov-6963098-300x200.jpg 300w, https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-mikhail-nilov-6963098-768x512.jpg 768w, https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-mikhail-nilov-6963098-1536x1024.jpg 1536w, https:\/\/qtnt.com\/wp-content\/uploads\/2024\/04\/pexels-mikhail-nilov-6963098-2048x1365.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center has-large-font-size\"><\/p>\n<\/div><\/div>\n\n\n\n<p>The control objective is to ascertain whether adequate technical security controls have been implemented to secure the infrastructure, platforms hosting the critical Business application systems for the organisation. The Assessment approach adopted starts with reviewing the network diagram\/ topology\/ network traffic profile and understand security devices deployed to protect organisations information assets.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Assess Application Threat profile and build Threat Vulnerability Asset Matrix, understand weak links in application, evaluate if weak links in application can be exploited<\/li>\n\n\n\n<li>Assess the Risk of the underlying Information Assets and carry out Risk Rating and reporting with remedial action plan<\/li>\n\n\n\n<li>Assess the adequacy of the Data Integrity, Privacy &amp; Security controls<\/li>\n\n\n\n<li>Carry out Testing of Key controls through technical vulnerability assessment and penetration testing<\/li>\n\n\n\n<li>Assess Application system Architecture, Authentication, Authorization &amp; Audit process controls<\/li>\n\n\n\n<li>Assess the adequacy of the inbuilt Application Input, Process &amp; Output controls ( say for e.g have concept of Dual control implemented for high value transaction, Monetary value validation, Error handling etc)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The control objective is to ascertain whether adequate technical security controls have been implemented to secure the infrastructure, platforms hosting the critical Business application systems for the organisation. The Assessment approach adopted starts with reviewing the network diagram\/ topology\/ network traffic profile and understand security devices deployed to protect organisations information assets.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-901","page","type-page","status-publish","hentry"],"blocksy_meta":[],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":""},"post_excerpt_stackable":"<p>The control objective is to ascertain whether adequate technical security controls have been implemented to secure the infrastructure, platforms hosting the critical Business application systems for the organisation. The Assessment approach adopted starts with reviewing the network diagram\/ topology\/ network traffic profile and understand security devices deployed to protect organisations information assets. Assess Application Threat profile and build Threat Vulnerability Asset Matrix, understand weak links in application, evaluate if weak links in application can be exploited Assess the Risk of the underlying Information Assets and carry out Risk Rating and reporting with remedial action plan Assess the adequacy of the&hellip;<\/p>\n","category_list":"","author_info":{"name":"admin","url":"https:\/\/qtnt.com\/index.php\/author\/venkat\/"},"comments_num":"0 comments","_links":{"self":[{"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/pages\/901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/comments?post=901"}],"version-history":[{"count":3,"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/pages\/901\/revisions"}],"predecessor-version":[{"id":1055,"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/pages\/901\/revisions\/1055"}],"wp:attachment":[{"href":"https:\/\/qtnt.com\/index.php\/wp-json\/wp\/v2\/media?parent=901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}