Page 53 - 4-Level Funnel Diagram Design for PowerPoint
P. 53
Application-Layer Security
STEP 5
Obtain a report of overall application
configuration parameters and test to
ensure the settings associated with
security are reasonable.
Obtain a report of user’s access Access
capabilities and test to ensure they are
appropriate.
From the reports of role activity
assignments and user access capability,
perform analytical procedures.