The vendor is required to provide from qualified firms to conduct a comprehensive IT security audit of our systems, networks, and processes.
- The primary objective is to evaluate the current security posture, identify vulnerabilities, and provide actionable recommendations to enhance our overall cybersecurity framework.
- The IT security audit should include, but is not limited to, the following:
• Network security
1. Assessment of firewalls, routers, and other network devices.
2. Penetration testing and vulnerability assessment.
3. Evaluation of wireless network security.
• Application security
1. Review of critical applications for vulnerabilities.
2. Static and dynamic code analysis (if applicable).
• Data security
1. Assessment of data protection mechanisms.
2. Review of data encryption, backup, and recovery practices.
• User access management
1. Analysis of user access controls and authentication mechanisms.
2. Review of role-based access controls and privilege management.
• Policies and procedures
1. Review of IT security policies and adherence to industry standards.
2. Incident response and disaster recovery plans.
• Compliance
1. Assessment of compliance with relevant regulations and standards.
• Reporting
1. A detailed report highlighting findings, risks, and prioritized recommendations.
2. Executive summary for senior leadership.
Set up free email alerts and get notified when new government bids, tenders and procurement opportunities match your industry and location. Choose daily or weekly delivery.