Assessing Security Appliances

pts.
Tags:
Application security
Database
Encryption
Instant Messaging
Microsoft Exchange
Secure Coding
We have several appliances performing specialized tasks in our environment. I've been asked to perform an audit of these appliances. Since most of these appliances run a version of Linux/Unix I've decided to audit in a two phase process. First looking at the OS/Kernel and then the application. My question is there an auditing framework for these appliances that ensure that critical areas are not overlooked because of a lack of experience?

Answer Wiki

Thanks. We'll let you know when a new response is added.

Here are some good places to start:

www.sans.org reading room
www.cisecurity.org (Center for Internet Security)

Bob

Discuss This Question:  

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following