Information security policies and standards review and customization.
- Policy and standard review.
- User and Group Management
- Backup and Restore Policy
- Change Policy
- Disaster Recovery Policy
- Intrusion Detection Policy
- Audit Log Policy
- Technical Security Review
- Network, System, and Application controls
- User and Administrative Controls
- Authentication and Authorization
- Auditing Controls
- Access controls
While Info Risk Group is willing to look only at the technical controls of a specific application or system; we encourage our customers to always review the security of the entire system in conjunction with the application. The application and system are bound together each directly affecting the security of the overall system. Please contact us if you have any questions on this or any other service we offer.