What types of malicious activity are included in the testing? What log files get monitored? Do you wish to monitor internal traffic as well as external traffic? Is access to keys restricted to the fewest number of custodians necessary? What is the
What types of malicious activity are included in the testing? What log files get monitored? Do you wish to monitor internal traffic as well as external traffic? Is access to keys restricted to the fewest number of custodians necessary? What is the