Services - Controls Audit

By: Axenic  06-Dec-2011
Keywords: Information Security

Services - Controls Audit

Information system controls audits identify configuration and management weaknesses that can expose an organisation to unnecessary risks. Our work programmes can be tailored to assess controls against organisation’s preferred standards (for example, an Information Security Policy, Security in the Government Sector (SIGS), NZISM, or a Centre for Internet Security (CIS) baseline). This ensures our recommendations align with a relevant information security strategy.

Keywords: Information Security

Contact Axenic

Email - none provided

Print this page

Other products and services from Axenic

06-Dec-2011

Services - Overview

Having a defined enterprise security architecture and standard platform for system deployment can eliminate most of the security debate when deploying a new application, or connecting a new office, into your environment. Risk Management can assist you to understand the value of your information assets and the consequences to your business should they be compromised, enabling you make informed decisions on how to protect them.


06-Dec-2011

Services - Risk Management

We believe that the risk profile and appetite of any organisation is unique, so our risk assessment methodology, based on New Zealand Standard AS/NZS ISO 31000, focuses on assessing and prioritising risks within your business context. We understand that effective risk management provides organisations with a high degree of confidence that their risk exposures are being identified and properly managed.


06-Dec-2011

Services - Security Architecture

Our methodology enables us to help clients define and understand their business security requirements to ensure that their security architecture and roadmap meet those requirements. We design cost-effective security solutions that provide the appropriate technical controls to meet the organisations strategic or tactical goals.


06-Dec-2011

Services - IS Governance

We can map the findings to your preferred information security framework and can assist in development and implementation of information security governance frameworks. We assess the maturity of your information security governance processes and procedures to ensure they fully support your organisation’s strategy and policy.


06-Dec-2011

Services - Security Policy

We have extensive experience in developing information security policies that clearly articulate management’s strategy to ensure that it is communicated and consistently applied across the organisation thus establishing and developing an information security culture. Our methodology is based on international standards and frameworks including ISO 27001/27002 and CoBIT 4.1.


06-Dec-2011

Services - IS Strategy

Our approach to security strategy after establishing the business context is to define control objectives, identify and assess controls that meet those objectives, select appropriate controls and establish measures to assess their effectiveness. It is essential to align the information security strategy with the overarching business strategy to ensure the organisation’s business objectives are fully supported.