- An evaluation of the holistic approach in terms of cyber security
-
- active and passive security scanning of vulnerabilities
- Open-Source Software (OSS) vulnerability scanning
- Security policies analysis
- Analysis of history of public vulnerabilities
- CRVS product provider response/management and communication to users
- Analysis of the security of data at rest and in motion
- Analysis of security guidelines/documentation (including resilience and recovery recommendations)
- Aase of user interface for setting roles and status visibility.
- Introduction & Objectives
- Scope of Work
- Methodology
-
- Planning
- Risk Classification
- Tools and Scanners
- Identified Vulnerabilities / Findings
- Miscellaneous Issues / Non-Findings
- Conclusion